CN104486482A - Mobile terminal anti-theft tracking method - Google Patents

Mobile terminal anti-theft tracking method Download PDF

Info

Publication number
CN104486482A
CN104486482A CN201410658894.3A CN201410658894A CN104486482A CN 104486482 A CN104486482 A CN 104486482A CN 201410658894 A CN201410658894 A CN 201410658894A CN 104486482 A CN104486482 A CN 104486482A
Authority
CN
China
Prior art keywords
mobile terminal
information
server
antitheft
instruction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410658894.3A
Other languages
Chinese (zh)
Inventor
柯卫卫
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Jinli Communication Equipment Co Ltd
Original Assignee
Shenzhen Jinli Communication Equipment Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Jinli Communication Equipment Co Ltd filed Critical Shenzhen Jinli Communication Equipment Co Ltd
Priority to CN201410658894.3A priority Critical patent/CN104486482A/en
Publication of CN104486482A publication Critical patent/CN104486482A/en
Pending legal-status Critical Current

Links

Landscapes

  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the invention discloses a mobile terminal anti-theft tracking method, comprising the steps of transmitting a predetermined anti-theft operation instruction in an anti-theft tracking system to a mobile terminal according to the unique identification information of a mobile terminal, and indicating the mobile terminal to feed back the tracking information according to the anti-theft operation instruction; tracking the mobile terminal according to the tracking information. By utilizing the mobile terminal anti-theft tracking method, the mobile terminal can be locked by the unique identification information, the operation success rate of the anti-theft tracking system is improved, the protection function of anti-theft operation is enhanced, and a lost mobile terminal of a user can be conveniently found.

Description

A kind of guarding against theft for mobile terminal method for tracing
Technical field
The present invention relates to the communications field, particularly relate to a kind of guarding against theft for mobile terminal method for tracing.
Background technology
Along with the development of science and technology, mobile phone is more and more universal, simultaneously, function also from strength to strength, mobile phone develops the electronic portable device becoming a kind of integrated multifunction from a kind of simple means of communication, like this, the loss of mobile phone or stolenly become very usual something, can bring certain economic loss and the danger of privacy leakage like this.
At present, the technology of antitheft mobile phone mainly comprises following two classes: 1, utilize and change card operation judgement hand-set from stolen, obtain mobile phone geographical location information, changing card is plant thing comparatively frequently, thus causes this mode misoperation probability high; 2, utilize Accounting system in mobile phone to carry out antitheft information capture, this mode is after mobile phone carries out factory reset or format manipulation, and its accounts information is difficult to retain, once accounts information is lost, just cannot realize following the trail of.
Summary of the invention
Embodiments provide a kind of guarding against theft for mobile terminal method for tracing, by unique identifying information, mobile terminal is followed the trail of, improve the success rate that mobile terminal is followed the trail of, long-term tracking can be realized.
Embodiment of the present invention first aspect provides a kind of guarding against theft for mobile terminal method for tracing, and described method comprises:
The antitheft operational order preset in anti-theft tracking system is sent to described mobile terminal by the unique identification information according to mobile terminal, indicates described mobile terminal to feed back its tracked information according to described antitheft operational order;
According to described tracked information, described mobile terminal is followed the trail of.
Embodiment of the present invention second aspect provides a kind of guarding against theft for mobile terminal method for tracing, and described method comprises:
The antitheft operational order preset in the anti-theft tracking system that reception server sends;
According to described antitheft operational order to described server feedback tracked information, described mobile terminal is followed the trail of according to described tracked information to make described server.
The antitheft operational order preset in anti-theft tracking system is sent to described mobile terminal according to the unique identification information of mobile terminal by the embodiment of the present invention, indicate described mobile terminal to feed back its tracked information according to described antitheft operational order, according to described tracked information, described mobile terminal is followed the trail of.The embodiment of the present invention can be locked mobile terminal by unique identifying information, improves anti-theft tracking Dynamic System success rate, enhances the defencive function of antitheft operation, is more conducive to the mobile terminal that user gives loss for change.
Accompanying drawing explanation
In order to be illustrated more clearly in the technical scheme in the embodiment of the present invention, be briefly described to the accompanying drawing used required in embodiment, description below, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
First embodiment schematic flow sheet of a kind of guarding against theft for mobile terminal method for tracing that Fig. 1 provides for the embodiment of the present invention;
Second embodiment schematic flow sheet of a kind of guarding against theft for mobile terminal follow-up mechanism that Fig. 2 provides for the embodiment of the present invention;
The example structure schematic diagram of a kind of server that Fig. 3 provides for the embodiment of the present invention;
The example structure schematic diagram of a kind of mobile terminal that Fig. 4 provides for the embodiment of the present invention;
The example structure schematic diagram of a kind of guarding against theft for mobile terminal follow-up mechanism that Fig. 5 provides for the embodiment of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, be clearly and completely described the technical scheme in the embodiment of the present invention, obviously, described embodiment is only the present invention's part embodiment, instead of whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art, not making the every other embodiment obtained under creative work prerequisite, belong to the scope of protection of the invention.
In specific implementation, in the embodiment of the present invention, mobile terminal can include but not limited to: notebook computer, mobile phone, panel computer, intelligent wearable device etc.The system of mobile terminal refers to the operating system of terminal, can include but not limited to: android system, Saipan system, Windows system, IOS (Mobile operating system of Apple's exploitation) system etc.It should be noted that, Android mobile terminal refers to the mobile terminal of android system, and Saipan mobile terminal refers to the mobile terminal of Saipan system, etc.Above-mentioned mobile terminal is only citing, and non exhaustive, including but not limited to above-mentioned terminal.
Below will for mobile phone, the guarding against theft for mobile terminal method for tracing that composition graphs 1 to Fig. 5 provides the embodiment of the present invention and device are specifically described.
Refer to Fig. 1, Fig. 1 is the first embodiment schematic flow sheet of the guarding against theft for mobile terminal method for tracing that the embodiment of the present invention provides.Guarding against theft for mobile terminal method for tracing described in the present embodiment, comprises step:
S101, according to the unique identification information of mobile terminal, the antitheft operational order preset in anti-theft tracking system is sent to described mobile terminal, indicates described mobile terminal to feed back its tracked information according to described antitheft operational order.
In specific implementation, the guarding against theft for mobile terminal method for tracing described in the embodiment of the present invention can by mobile phone, or the appointed function module of embedded in mobile phone, or the terminal equipment of outer handset performs, and does not limit at this.Below the terminal equipment for outer handset is specifically described, this terminal equipment can be communicated by mobile phone, also can communicate with server, can in conjunction with the anti-theft tracking of server realization to mobile phone, such as between mobile phone and server, carry out with mobile phone and server the server that communicates.
Particularly, server, by the login interface of anti-theft tracking system, obtains the unique identification information of mobile terminal at this login interface.Wherein, the unique identification information of above-mentioned mobile terminal can have been inputted by user, and input mode comprises: by modes etc. such as key-press input, touch-screen input, pointer inputs.The account that unique identification information specifically can be mobile device international identity code (International Mobile Equipment Identity, IMEI) or associates with IMEI.Alternatively, before first use mobile terminal or mobile terminal are not lost, user arranges unique identification information at server or mobile terminal.Alternatively, unique identification information can be the IMEI number of mobile terminal, corresponding encrypted message can be set while IMEI number is set, like this after mobile terminal returns to Default Value or format, when there being network, still can mutual by with server, detect that this mobile terminal has had the Accounting system that mates and do not needed to repeat to arrange, reach and only need arrange once, and this burglary-resisting system keeps anti-theft state always.Further, because IMEI is longer, comprise 15 characters, be difficult to memory, unique identification information can be the account associated with IMEI, i.e. secondary account.Secondary account can arrange by user the account being convenient to remember, and the password that the password of secondary account can arrange the IMEI number associated with it is identical, also can be arranged in addition by client, secondary account is saved to server simultaneously.The mode of unique identification information is specifically set alternatively, secondary account information interface input IMEI number information being set or associating with IMEI number of server log anti-theft tracking system, and encrypted message is set, short-message verification information can be sent to mobile terminal simultaneously, continue the short-message verification information that the reception of interface input mobile terminal is set in server log anti-theft tracking system; Or mobile terminal logs in the secondary account information arranging interface input IMEI number information or associate with IMEI number of anti-theft tracking system, and encrypted message is set, association request can be sent to server simultaneously, server sends short-message verification information to mobile terminal, continues the short-message verification information arranging the reception of interface input mobile terminal logging in anti-theft tracking system at mobile terminal.By unique identification information, set up associating between server with mobile terminal.
In specific implementation, the anti-theft tracking instruction preset comprises: instruction, image watermarking instruction or application lock instruction etc. are eliminated in anti-theft tracking instruction, data.Server presets corresponding antitheft operational order, the instruction these set is pushed to mobile terminal, mobile terminal performs corresponding antitheft action according to these antitheft operational orders, and mobile terminal is to server feedback tracked information simultaneously, with the message making user get mobile terminal.
If the antitheft operational order preset is anti-theft tracking instruction, described mobile terminal is indicated to feed back its tracked information by anti-theft tracking instruction, wherein, tracked information comprises: SIM card information, audio/video information or associated person information etc. after geographical location information, replacing.The geographical location information of its position can be recorded by mobile terminal, and continuous positioning, timed sending is to server, and server is analyzed these locating information, marks the activity diagram in resource-user cost method region.Whether mobile terminal can also change SIM card information to it is detected, when it has changed SIM card, SIM card information after replacing can be fed back to server, meanwhile, also the associated person information stored in the SIM card after replacing can be fed back to server, public security organ can be followed the trail of by the information of SIM card, at present, great majority card is all system of real name, according to the SIM card of system of real name, is more conducive to the mobile terminal that public security organ recovers loss.If mobile terminal employs camera, the information feed back that camera can also be captured is to server.If post-positioned pick-up head, the scene information in the pictorial information obtained is analyzed, is analyzed the building in concrete scene, scenery etc., matched geographical position and other clues that photo Scene may occur.If front-facing camera, then obtain the portrait information of user possibly, the crime analysis or the lost article that may be used for public security organ recover work, the video information got can also be sent to server by camera.Alternatively, mobile terminal can also open listen mode, opens listen mode by anti-theft tracking instruction to mobile terminal, after mobile terminal is lost, is recorded by the telephone communication of user, is compressed into audio file, be sent to server.
S102, according to described tracked information, described mobile terminal to be followed the trail of.
Particularly, tracked information can be fed back to server by mobile terminal, then is analyzed these tracked information by server.When mobile terminal has network, user can carry out real-time tracing to the service condition of mobile terminal.
The antitheft operational order preset in anti-theft tracking system is sent to described mobile terminal by the unique identification information according to mobile terminal by the embodiment of the present invention, indicate described mobile terminal to feed back its tracked information according to described antitheft operational order, according to described tracked information, described mobile terminal is followed the trail of.The embodiment of the present invention can be locked mobile terminal by unique identifying information, improves the successful probability of anti-theft tracking Dynamic System, enhances the defencive function of antitheft operation, is more conducive to the mobile terminal that user gives loss for change.
As a kind of possible execution mode, the antitheft operational order preset being sent to mobile terminal in S101 step can be data and eliminates instruction, eliminate instruction indicating mobile terminal Backup Data by data and eliminate the data eliminated described in instruction, and indicating mobile terminal deletes the data that data elimination instruction will be eliminated.Corresponding privacy information is had in everyone mobile terminal, as contact person, message registration, photo, QQ, micro-letter, microblogging, Alipay etc., eliminate instruction by data and selectivity elimination is carried out to the data of mobile terminal, mobile terminal first can back up corresponding data to server, so that mobile terminal carries out date restoring after finding.As functions such as the contact persons in mobile terminal, when being provided with " deletion address list ", alternatively, data are eliminated instruction and are pushed to mobile terminal by server, indicating mobile terminal obtains the list of application of application function, server returns the list of application of the application function of mobile terminal, user needs the function carrying out hiding from the reality interface input of server, setting as selected is " address list ", the setting of selection is sent to mobile terminal by server, indicating mobile terminal carries out data elimination to address list application function, before the data of mobile terminal are eliminated, server can point out user the need of backup, after user determines backup, first server is saved to the data of address list application function, then the address book data of indicating mobile terminal to its inside is eliminated, the data removed can comprise message registration, the contact person of mobile terminal, contact person etc. in SIM card.Further alternatively, when being provided with " deletion address list ", mobile terminal, according to command prompt, searches the address list of its inside, is first backed up by the address list of its inside, and then is eliminated from mobile terminal by this address list.Further, if user needs data mobile terminal being recovered to elimination after giving mobile terminal for change, then only need to eliminate instruction in Servers installed data, further alternatively, server display interface there will be the list of application of the function eliminated or the application function occurring mobile terminal, the function that this list of application comprises elimination and the application function do not eliminated, user can select the application function eliminated, after determination operation, just the application function of backup can be sent to mobile terminal, user just can to again getting the data eliminated in the past.Data eliminate instruction at the privacy information to a certain degree protecting user the most fast.
Further alternatively, the antitheft operational order preset being sent to mobile terminal in S101 step can be image watermarking instruction, hides by image watermarking instruction indicating mobile terminal hiding data the data that instruction will hide.The data of mobile terminal to wherein outbalance can arrange hiding.As functions such as the quick payments in mobile terminal, when being provided with image watermarking instruction, image watermarking instruction is pushed to mobile terminal by server, indicating mobile terminal obtains the list of application of application function, server returns the list of application of the application function of mobile terminal, user needs the function carrying out hiding from the reality interface input of server, setting as selected is " Alipay ", the setting of selection is sent to mobile terminal by server, indicating mobile terminal locks Alipay application function, and such user just cannot use Alipay function.Further, if user needs to recover hiding data to mobile terminal after giving mobile terminal for change, then only need in the instruction of Servers installed image watermarking, further alternatively, the display interface that server connects there will be the list of application of the function hidden or the application function occurring mobile terminal, this list of application comprises hiding function and the application function do not hidden, user can select the application function hidden, after determination operation, just hiding application function can be recovered, user just can apply the application function hidden in the past again.
Further alternatively, the antitheft operational order preset being sent to mobile terminal in S101 step can be application lock instruction, the application function that will be locked by application lock instruction indicating mobile terminal locking application lock instruction.Particularly, when application lock instruction is set, the feature list of function in mobile terminal can be got, such as, the function that general mobile terminal is conventional, contact person, note, microblogging, QQ, everybody, the function such as beautiful group, Alipay, bank client payment system, 12306 ticket-booking systems, photo, video, daily record, user can select these functions at server, and the function of the needs locking selected just constitutes the application function applied and pre-set in lock instruction.Further possibly, user is when Servers installed application lock instruction, the display interface that server connects can show conventional locking to list, as the information such as " mobile terminal contact person ", " note ", " message registration ", " picture ", " audio frequency and video ", " daily record ", and indicating mobile terminal is not needed to obtain its application function.The application function that its inside comprises is found according to application lock instruction indicating mobile terminal, then, the application function searched out is mated with the application function in list of application, obtains applying in the application function of mobile terminal the application function that the application function in the list of application of lock instruction matches.To unlock the application function locked in mobile terminal, then only need to arrange application lock instruction, further alternatively, display interface there will be the list of application of the application function locked or the application function occurring mobile terminal, this list of application comprises the function of locking and the application function of non-locking, user only needs the application function to having locked to select, after determination operation, just can recover the application function locked, user just can apply the application function of locking in the past again.
Refer to Fig. 2, the second embodiment schematic flow sheet of a kind of guarding against theft for mobile terminal method for tracing that Fig. 2 provides for the embodiment of the present invention.The guarding against theft for mobile terminal method for tracing of the embodiment of the present invention, comprises step:
The antitheft operational order preset in the anti-theft tracking system that S201, reception server send.
Particularly, mobile terminal receives the antitheft operational order preset in anti-theft tracking system, and completes corresponding operation according to this antitheft operational order indicating mobile terminal.Anti-theft tracking system accessible site, in the operating system of mobile terminal, is also installed by client-side program.If the anti-theft tracking system integration, in the operating system of mobile terminal, just cannot unload.
S202, according to described antitheft operational order to server feedback tracked information, described mobile terminal is followed the trail of according to described tracked information to make described server.
Particularly, when mobile terminal completes corresponding antitheft action according to antitheft operational order, tracked information is fed back to server.As when mobile terminal opens camera, the number information of its inner SIM card embedded is fed back to server by mobile terminal.
The antitheft operational order preset in the anti-theft tracking system that the embodiment of the present invention is sent by reception server, according to described antitheft operational order to server feedback tracked information, described mobile terminal is followed the trail of according to described tracked information to make described server.The embodiment of the present invention can be locked mobile terminal by unique identifying information, improves the successful probability of anti-theft tracking Dynamic System, enhances the defencive function of antitheft operation, is more conducive to the mobile terminal that user gives loss for change.
See Fig. 3, it is the example structure schematic diagram of a kind of server that the embodiment of the present invention provides.Server described in the present embodiment, comprising:
Setting unit 301, for setting unit, if for user input be mobile device international identity code IMEI, mobile device international identity code IMEI is set to unique identification information.
In specific implementation, the guarding against theft for mobile terminal method for tracing described in the embodiment of the present invention can by mobile phone, or the appointed function module of embedded in mobile phone, or the terminal equipment of outer handset performs, and does not limit at this.Below the terminal equipment for outer handset is specifically described, this terminal equipment can be communicated by mobile phone, also can communicate with server, can in conjunction with the anti-theft tracking of server realization to mobile phone, such as between mobile phone and server, carry out with mobile phone and server the server that communicates.
Particularly, the unique identification information account that is mobile device international identity code IMEI or associates with mobile device international identity code IMEI.Alternatively, use before mobile terminal or mobile terminal do not lose first, user when using mobile terminal, setting unit 301, if for user's input is mobile device international identity code IMEI, mobile device international identity code IMEI is set to unique identification information.Alternatively, unique identification information can be the IMEI number of mobile terminal, corresponding encrypted message can be set while IMEI number is set, like this after mobile terminal returns to Default Value or format, when there being network, still can mutual by with server, detect that this mobile terminal has had the Accounting system that mates and do not needed to repeat to arrange, reach and only need arrange once, and this burglary-resisting system keeps anti-theft state always.Further, because IMEI number is longer, be difficult to memory, unique identification information can be the account associated with mobile device international identity code IMEI, i.e. secondary account.Secondary account can arrange by user the account being convenient to remember, and the password that the password of secondary account can arrange the IMEI number associated with it is identical, also can be arranged in addition by client and secondary account is saved to server simultaneously.The mode of unique identification information is specifically set alternatively, secondary account information interface input IMEI number information being set or associating with IMEI number of server log anti-theft tracking system, and encrypted message is set, short-message verification information can be sent to mobile terminal simultaneously, continue the short-message verification information that the reception of interface input mobile terminal is set in server log anti-theft tracking system; Or mobile terminal logs in the secondary account information arranging interface input IMEI number information or associate with IMEI number of anti-theft tracking system, and encrypted message is set, association request can be sent to server simultaneously, server sends short-message verification information to mobile terminal, continues the short-message verification information arranging the reception of interface input mobile terminal logging in anti-theft tracking system at mobile terminal.By unique identification information, set up associating between server with mobile terminal.
Further alternatively, if setting unit 301 also specifically for user input be the account associated with described mobile device international identity code IMEI time, the account associated with described mobile device international identity code IMEI is set to unique identification information, preserves described unique identification information simultaneously.
Transmitting element 302, for being sent to described mobile terminal according to unique identification information by the antitheft operational order preset in anti-theft tracking system.
In specific implementation, server at the login interface of anti-theft tracking system, can obtain the unique identification information of mobile terminal at this login interface.The mode obtaining unique identification information can comprise: user is inputted from login interface by modes such as key-press input, touch-screen input, pointer inputs.Server by display interface get be mobile device international identity code IMEI time, as long as input correct password, that just can set up between server and mobile terminal is mutual.
Particularly, the anti-theft tracking instruction preset comprises: at least one in instruction, image watermarking instruction or application lock instruction is eliminated in anti-theft tracking instruction, data.Corresponding antitheft operational order is set, the instruction that these are set by server by transmitting element 302 is pushed to mobile terminal, mobile terminal performs corresponding antitheft action, simultaneously to server feedback tracked information, with the message making user get mobile terminal according to these antitheft operational orders.
Indicating member 303, is used to indicate described mobile terminal and feeds back its tracked information according to described antitheft operational order.
Particularly, indicating member 303 indicates mobile terminal according to antitheft operational order, according to this indication information, mobile terminal implements corresponding operating, and to its tracked information of server feedback, what now arrange be antitheft operational order is anti-theft tracking instruction, and indicating member 303 indicates described mobile terminal to feed back its tracked information by anti-theft tracking instruction, wherein, tracked information comprises: at least one in SIM card information, audio/video information or associated person information after geographical location information, replacing.The geographical location information of its position can be recorded by mobile terminal, and continuous positioning, timed sending is to server, and server is analyzed these locating information, marks the activity diagram in resource-user cost method region.Whether mobile terminal can also change SIM card information to it is detected, and when it has changed SIM card, the SIM card information after replacing can be fed back to server, meanwhile, also the associated person information stored in the SIM card after replacing can be fed back to server.If mobile terminal employs camera, the information that camera can also be captured, feed back to server, if post-positioned pick-up head, scene information in the pictorial information obtained is analyzed, analyze the building in concrete scene, scenery etc., match geographical position and other clues that photo Scene may occur, if front-facing camera, then obtain the portrait information of user possibly, the crime analysis or the lost article that may be used for public security organ recover work, the video information got can also be sent to server by camera.Alternatively, mobile terminal can also open listen mode, opens listen mode by anti-theft tracking instruction to mobile terminal, after mobile terminal is lost, is recorded by the telephone communication of user, is compressed into audio file, be sent to server.
Tracing unit 304, for following the trail of described mobile terminal according to described tracked information.
Particularly, tracked information can be fed back to server by mobile terminal, then is analyzed these tracked information by server.When mobile terminal has network, user can carry out real-time tracing by this device to the service condition of mobile terminal.
The embodiment of the present invention is by setting unit 301, and what user inputted is that mobile device international identity code IMEI or the account that associates with described mobile device international identity code IMEI are set to unique identification information.The antitheft operational order preset in anti-theft tracking system is sent to described mobile terminal according to unique identification information by transmitting element 302; indicating member 303 indicating mobile terminal feeds back its tracked information according to antitheft operational order; tracing unit 304; according to this tracked information, mobile terminal is followed the trail of; the embodiment of the present invention can be locked mobile terminal by unique identifying information; improve the successful probability of anti-theft tracking Dynamic System; enhance the defencive function of antitheft operation, be more conducive to the mobile terminal that user gives loss for change.
As a kind of possible execution mode, when transmitting element 302 sends to the antitheft operational order of mobile terminal to be data elimination instruction, indicating member 303 also eliminates specifically for indicating described mobile terminal to back up described data the data eliminated described in instruction, and indicates described mobile terminal to delete described data to eliminate the data that instruction will eliminate.Further alternatively, above-mentioned antitheft operational order can be data and eliminates instruction, indicating member 303 is eliminated instruction indicating mobile terminal Backup Data by data and is eliminated the data eliminated described in instruction, and indicating mobile terminal deletes the data that data elimination instruction will be eliminated.Corresponding privacy information is had in everyone mobile terminal, as contact person, message registration, photo, QQ, micro-letter, microblogging etc., eliminate instruction by the data arranged and selectivity elimination is carried out to the data of mobile terminal, mobile terminal first can back up corresponding data to server end, so that mobile terminal carries out date restoring after finding.When being provided with " deletion address list ", mobile terminal, according to command prompt, searches the address list of its inside, is first backed up by the address list of its inside, and then is eliminated from mobile terminal by this address list.Further, if user needs data mobile terminal being recovered to elimination after giving mobile terminal for change, then only need to eliminate instruction by Servers installed data, further alternatively, the display interface that server connects there will be the list of application of the function eliminated or the application function occurring mobile terminal, the function that this list of application comprises elimination and the application function do not eliminated, user only needs the application function to having eliminated to select, after determination operation, just the application function of backup can be sent to mobile terminal, user just can to again getting the data eliminated in the past.Data eliminate instruction at the privacy information to a certain degree protecting user the most fast.
As a kind of possible execution mode, when transmitting element 302 sends to the antitheft operational order of mobile terminal to be image watermarking instruction, indicating member 303 is also specifically for hiding the data that instruction will be hidden by image watermarking instruction indicating mobile terminal hiding data.The data of mobile terminal to wherein outbalance can arrange hiding.As functions such as the quick payments in mobile terminal, when being provided with image watermarking instruction, image watermarking instruction is pushed to mobile terminal by server, indicating mobile terminal obtains the list of application of application function, server returns the list of application of the application function of mobile terminal, user needs the function carrying out hiding from the display interface input that server connects, setting as selected is " Alipay ", the setting of selection is sent to mobile terminal by server, indicating mobile terminal locks Alipay application function, and such user just cannot use Alipay function.Further, if user needs to recover hiding data to mobile terminal after giving mobile terminal for change, then only need in the instruction of Servers installed image watermarking, further alternatively, display interface there will be the list of application of the function hidden or the application function occurring mobile terminal, this list of application comprises hiding function and the application function do not hidden, user only needs the application function to hiding to select, after determination operation, just can recover hiding application function, user just can apply the application function hidden in the past again.
As a kind of possible execution mode, when transmitting element 302 sends to the antitheft operational order of mobile terminal for application lock instruction, indicating member 303 also locks the application function applied lock instruction and will lock specifically for indicating mobile terminal.Particularly, when user arranges application lock instruction, the feature list of function in mobile terminal can be got, such as, the function that general mobile terminal is conventional, contact person, note, microblogging, QQ, everybody, the function such as beautiful group, Alipay, bank client payment system, 12306 ticket-booking systems, photo, video, daily record, user can select these functions, and the function of the needs locking selected just constitutes the application function applied and pre-set in lock instruction.Further possibly, when user arranges application lock instruction, the locking application function list that direct acquisition is conventional, as the information such as " mobile terminal contact person ", " note ", " message registration ", " picture ", " audio frequency and video ", " daily record ", and indicating mobile terminal is not needed to obtain its application function.Mobile terminal searches the application function matched with the application function in described list of application in its internal applications function, and indicates the application function that the application function in described mobile terminal locking and described list of application matches.The application function that its inside comprises is found according to application lock instruction indicating mobile terminal, then, the application function searched out is mated with the application function in list of application, obtains applying in the application function of mobile terminal the application function that the application function in the list of application of lock instruction matches.To unlock the application function locked in mobile terminal, then can application lock instruction be set again, further alternatively, the list of application of the application function that locked or the application function that occurs mobile terminal can be there is in the display interface of connection server, this list of application comprises the function of locking and the application function of non-locking, user only needs the application function to having locked to select, after determination operation, just can recover the application function locked, user just can apply the application function of locking in the past again.
See Fig. 4, it is the example structure schematic diagram of a kind of mobile terminal that the embodiment of the present invention provides.Mobile terminal described in the present embodiment, comprising:
Receiving element 401, for the antitheft operational order preset in the anti-theft tracking system that reception server sends.
Particularly, receiving element 401 receives the antitheft operational order preset in the anti-theft tracking system of server transmission, and completes corresponding operation according to this antitheft operational order indicating mobile terminal.Anti-theft tracking system accessible site, in the operating system of mobile terminal, is also installed by client-side program.If the anti-theft tracking system integration, in the operating system of mobile terminal, just cannot unload.
Feedback unit 402, for the described antitheft operational order that receives according to described receiving element to described server feedback tracked information, follows the trail of described mobile terminal according to described tracked information to make described server.
Particularly, when mobile terminal completes corresponding antitheft action according to antitheft operational order, tracked information is fed back to server by feedback unit 402.As when mobile terminal opens camera, the number information of its inner SIM card embedded is fed back to server by mobile terminal.
The antitheft operational order of the embodiment of the present invention by presetting in the anti-theft tracking system of receiving element 401 reception server transmission, feedback unit 402, is followed the trail of described mobile terminal according to described tracked information to server feedback tracked information to make described server according to described antitheft operational order.The embodiment of the present invention can be locked mobile terminal by unique identifying information, improves the successful probability of anti-theft tracking Dynamic System, enhances the defencive function of antitheft operation, is more conducive to the mobile terminal that user gives loss for change.
See the 3rd example structure schematic diagram of a kind of guarding against theft for mobile terminal follow-up mechanism that Fig. 5, Fig. 5 provide for the embodiment of the present invention.Terminal described in the present embodiment comprises: at least one input equipment 1000; At least one output equipment 2000; At least one processor 3000, such as CPU; With memory 4000, above-mentioned input equipment 1000, output equipment 2000, processor 3000 are connected by bus 5000 with memory 4000.
Wherein, above-mentioned input equipment 1000 specifically can be the display interface of server, display interface can be contact panel, common PC, liquid crystal display screen, touch screen etc., for the unique identification information that user is inputted from login interface by modes such as key-press input, touch-screen input, pointer inputs.
Above-mentioned output equipment 2000 specifically can be the display screen of terminal, for exporting, showing trace data (at least one in SIM card information, audio/video information or associated person information after geographical location information, replacing).
Above-mentioned memory 4000 can be high-speed RAM memory, also can be non-labile memory (non-volatile memory), such as magnetic disc store.Above-mentioned memory 4000 is for storing batch processing code, and above-mentioned input equipment 1000, output equipment 2000 and processor 3000, for calling the program code stored in memory 4000, perform and operate as follows:
Above-mentioned input equipment 1000, when user uses mobile terminal, arranges unique identification information.
Above-mentioned processor 3000, is sent to described mobile terminal by the antitheft operational order preset in described anti-theft tracking system, and indicates described mobile terminal to feed back its tracked information according to described antitheft operational order.
Above-mentioned output equipment 2000, exports tracked information and follows the trail of described mobile terminal.
In the execution mode that some are feasible, above-mentioned input equipment 1000 also specifically for:
When user input be IMEI time, IMEI is set to unique identification information.
In the execution mode that some are feasible, above-mentioned input equipment 1000 also specifically for:
When user input be the account associated with IMEI time, the account associated with IMEI is set to unique identification information, preserves described unique identification information simultaneously.
Above-mentioned processor 3000 also specifically for:
When input equipment obtain be data eliminate instruction time, indicate described mobile terminal to back up described data and eliminate the data eliminated described in instruction, and indicate described mobile terminal to delete described data to eliminate the data that instruction will eliminate.
In the implementation that some are feasible, above-mentioned processor 3000 also specifically for:
When input equipment obtain be image watermarking instruction time, indicate described in described mobile terminal locking and apply the application function that lock instruction asks for locking.
In the implementation that some are feasible, above-mentioned processor 3000 also specifically for:
The data indicating described mobile terminal to hide described image watermarking instruction will to hide.
In the execution mode that some are feasible, above-mentioned memory 4000 also specifically for:
When described mobile terminal opens camera, the number information of the SIM card in mobile terminal is sent to memory 4000.
In the implementation that some are feasible, the guarding against theft for mobile terminal follow-up mechanism described by Fig. 5 also specifically for:
Anti-theft tracking system accessible site is in the operating system of guarding against theft for mobile terminal follow-up mechanism.
In specific implementation, input equipment 1000 described in the embodiment of the present invention, output equipment 2000 and processor 3000 can perform the implementation described in Fig. 1 or Fig. 2 of the guarding against theft for mobile terminal method for tracing that the embodiment of the present invention provides, also can perform the implementation of the device described in Fig. 3 or Fig. 4 of the device that the embodiment of the present invention provides, not repeat them here.
Module in all embodiments of the present invention or submodule, universal integrated circuit can be passed through, such as CPU (Central Processing Unit, central processing unit), or realized by ASIC (Application SpecificIntegrated Circuit, application-specific integrated circuit (ASIC)).
Step in embodiment of the present invention method can be carried out order according to actual needs and be adjusted, merges and delete.
Unit in embodiment of the present invention device can carry out merging, divide and deleting according to actual needs.
One of ordinary skill in the art will appreciate that all or part of flow process realized in above-described embodiment method, that the hardware that can carry out instruction relevant by computer program has come, described program can be stored in a computer read/write memory medium, this program, when performing, can comprise the flow process of the embodiment as above-mentioned each side method.Wherein, described storage medium can be magnetic disc, CD, read-only store-memory body (Read-Only Memory, ROM) or random access memory (Random Access Memory is called for short RAM) etc.
Above disclosedly be only present pre-ferred embodiments, certainly can not limit the interest field of the present invention with this, therefore according to the equivalent variations that the claims in the present invention are done, still belong to the scope that the present invention is contained.

Claims (9)

1. a guarding against theft for mobile terminal method for tracing, is characterized in that, comprising:
The antitheft operational order preset in anti-theft tracking system is sent to described mobile terminal by the unique identification information according to mobile terminal, indicates described mobile terminal to feed back its tracked information according to described antitheft operational order;
According to described tracked information, described mobile terminal is followed the trail of.
2. the method for claim 1, is characterized in that, described antitheft operational order comprises: at least one in instruction, image watermarking instruction or application lock instruction is eliminated in anti-theft tracking instruction, data.
3. method as claimed in claim 1 or 2, it is characterized in that, described antitheft operational order is anti-theft tracking instruction;
The described mobile terminal of described instruction feeds back its tracked information according to described antitheft operational order, comprising:
Described mobile terminal is indicated to feed back its tracked information by described anti-theft tracking instruction;
Wherein, described tracked information comprises: at least one in SIM card information, audio/video information or associated person information after geographical location information, replacing.
4. the method for claim 1, is characterized in that, the account that described unique identification information is mobile device international identity code IMEI or associates with described mobile device international identity code IMEI.
5. the method as described in claim 1 or 4, is characterized in that, described unique identification information has been inputted at server or mobile terminal by user;
If that user's input is mobile device international identity code IMEI, mobile device international identity code IMEI is set to unique identification information.
6. method as claimed in claim 5, is characterized in that, also comprise:
If user's input is the account associated with described mobile device international identity code IMEI, the account associated is set to unique identification information, preserves described unique identification information simultaneously with described mobile device international identity code IMEI.
7. a guarding against theft for mobile terminal method for tracing, is characterized in that, comprising:
The antitheft operational order preset in the anti-theft tracking system that reception server sends;
According to described antitheft operational order to described server feedback tracked information, described mobile terminal is followed the trail of according to described tracked information to make described server.
8. method as claimed in claim 7, is characterized in that, described according to described antitheft operational order to server feedback tracked information, comprising:
When described mobile terminal opens camera, the number information of the SIM card in described mobile terminal is fed back to server.
9. method as claimed in claim 7, it is characterized in that, the described anti-theft tracking system integration is in the operating system of described mobile terminal.
CN201410658894.3A 2014-11-18 2014-11-18 Mobile terminal anti-theft tracking method Pending CN104486482A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410658894.3A CN104486482A (en) 2014-11-18 2014-11-18 Mobile terminal anti-theft tracking method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410658894.3A CN104486482A (en) 2014-11-18 2014-11-18 Mobile terminal anti-theft tracking method

Publications (1)

Publication Number Publication Date
CN104486482A true CN104486482A (en) 2015-04-01

Family

ID=52760984

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410658894.3A Pending CN104486482A (en) 2014-11-18 2014-11-18 Mobile terminal anti-theft tracking method

Country Status (1)

Country Link
CN (1) CN104486482A (en)

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104869243A (en) * 2015-05-08 2015-08-26 上海斐讯数据通信技术有限公司 Mobile phone anti-theft tracking system and method
CN104881612A (en) * 2015-05-06 2015-09-02 百度在线网络技术(北京)有限公司 Data deleting method and apparatus
CN104902080A (en) * 2015-04-30 2015-09-09 广东欧珀移动通信有限公司 Information interaction method and device
CN105141837A (en) * 2015-08-11 2015-12-09 广东欧珀移动通信有限公司 Loss tracking method and user terminal
CN105320880A (en) * 2015-11-12 2016-02-10 广东欧珀移动通信有限公司 Terminal control method and apparatus
CN105488368A (en) * 2015-11-30 2016-04-13 上海斐讯数据通信技术有限公司 Safety protection method and system of electronic device
CN105897692A (en) * 2016-03-25 2016-08-24 上海斐讯数据通信技术有限公司 Anti-theft system and anti-theft method for APP account number of intelligent terminal
CN105959936A (en) * 2016-06-24 2016-09-21 郑州信大捷安信息技术股份有限公司 System for recovering cloud data of mobile terminal, and data recovery method
WO2016180165A1 (en) * 2015-07-01 2016-11-17 中兴通讯股份有限公司 Mobile phone tracking method, apparatus and terminal
CN106303990A (en) * 2016-08-09 2017-01-04 深圳市金立通信设备有限公司 A kind of theft preventing method and terminal
CN106686196A (en) * 2017-01-22 2017-05-17 济南浪潮高新科技投资发展有限公司 Personal mobile phone safety management method
CN107038830A (en) * 2017-05-15 2017-08-11 北京圣奥安防科技有限公司 A kind of gun dynamic management system and method
CN107305115A (en) * 2016-04-21 2017-10-31 曾庆程 Electronic measuring device
CN107819752A (en) * 2017-10-30 2018-03-20 维沃移动通信有限公司 A kind of document protection method and mobile terminal
CN108810239A (en) * 2017-12-24 2018-11-13 湛江正信科技服务有限公司 Method, apparatus, intelligent terminal and the storage medium that intelligent terminal is recovered
WO2019041320A1 (en) * 2017-09-01 2019-03-07 深圳传音通讯有限公司 Mobile phone positioning and tracking method, smartphone, and storage medium
CN111010478A (en) * 2019-11-29 2020-04-14 苏宁云计算有限公司 Mobile terminal protection method, device and system
CN111885118A (en) * 2020-07-03 2020-11-03 上海钧正网络科技有限公司 Vehicle tracking method, vehicle tracking device, computer equipment and storage medium
CN112733048A (en) * 2021-01-20 2021-04-30 杭州云深科技有限公司 Tracking method of mobile device, electronic device, and medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101179851A (en) * 2007-11-23 2008-05-14 深圳市赛格导航科技股份有限公司 Positioning system and method of navigation mobile phone
CN103347131A (en) * 2013-07-05 2013-10-09 张�林 Intelligent mobile phone anti-theft method and system
CN103559433A (en) * 2013-10-31 2014-02-05 北京奇虎科技有限公司 Mobile terminal antitheft method and device
CN103702318A (en) * 2013-12-13 2014-04-02 北京奇虎科技有限公司 Mobile terminal antitheft method and client

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101179851A (en) * 2007-11-23 2008-05-14 深圳市赛格导航科技股份有限公司 Positioning system and method of navigation mobile phone
CN103347131A (en) * 2013-07-05 2013-10-09 张�林 Intelligent mobile phone anti-theft method and system
CN103559433A (en) * 2013-10-31 2014-02-05 北京奇虎科技有限公司 Mobile terminal antitheft method and device
CN103702318A (en) * 2013-12-13 2014-04-02 北京奇虎科技有限公司 Mobile terminal antitheft method and client

Cited By (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104902080A (en) * 2015-04-30 2015-09-09 广东欧珀移动通信有限公司 Information interaction method and device
CN104902080B (en) * 2015-04-30 2019-04-09 Oppo广东移动通信有限公司 A kind of information interacting method and equipment
CN104881612A (en) * 2015-05-06 2015-09-02 百度在线网络技术(北京)有限公司 Data deleting method and apparatus
CN104869243A (en) * 2015-05-08 2015-08-26 上海斐讯数据通信技术有限公司 Mobile phone anti-theft tracking system and method
CN104869243B (en) * 2015-05-08 2019-11-22 上海斐讯数据通信技术有限公司 A kind of anti-theft tracking of mobile phone system and method
CN106331300A (en) * 2015-07-01 2017-01-11 中兴通讯股份有限公司 Mobile phone tracking method and device as well as terminal
WO2016180165A1 (en) * 2015-07-01 2016-11-17 中兴通讯股份有限公司 Mobile phone tracking method, apparatus and terminal
CN105141837A (en) * 2015-08-11 2015-12-09 广东欧珀移动通信有限公司 Loss tracking method and user terminal
CN105320880A (en) * 2015-11-12 2016-02-10 广东欧珀移动通信有限公司 Terminal control method and apparatus
CN105488368A (en) * 2015-11-30 2016-04-13 上海斐讯数据通信技术有限公司 Safety protection method and system of electronic device
CN105897692A (en) * 2016-03-25 2016-08-24 上海斐讯数据通信技术有限公司 Anti-theft system and anti-theft method for APP account number of intelligent terminal
CN107305115A (en) * 2016-04-21 2017-10-31 曾庆程 Electronic measuring device
CN105959936A (en) * 2016-06-24 2016-09-21 郑州信大捷安信息技术股份有限公司 System for recovering cloud data of mobile terminal, and data recovery method
CN106303990A (en) * 2016-08-09 2017-01-04 深圳市金立通信设备有限公司 A kind of theft preventing method and terminal
CN106686196A (en) * 2017-01-22 2017-05-17 济南浪潮高新科技投资发展有限公司 Personal mobile phone safety management method
CN107038830A (en) * 2017-05-15 2017-08-11 北京圣奥安防科技有限公司 A kind of gun dynamic management system and method
CN111557103A (en) * 2017-09-01 2020-08-18 深圳传音通讯有限公司 Mobile phone positioning and tracking method, smart mobile phone and storage medium
WO2019041320A1 (en) * 2017-09-01 2019-03-07 深圳传音通讯有限公司 Mobile phone positioning and tracking method, smartphone, and storage medium
CN107819752A (en) * 2017-10-30 2018-03-20 维沃移动通信有限公司 A kind of document protection method and mobile terminal
CN107819752B (en) * 2017-10-30 2020-06-30 维沃移动通信有限公司 File protection method, mobile terminal and computer readable storage medium
CN108810239A (en) * 2017-12-24 2018-11-13 湛江正信科技服务有限公司 Method, apparatus, intelligent terminal and the storage medium that intelligent terminal is recovered
CN111010478A (en) * 2019-11-29 2020-04-14 苏宁云计算有限公司 Mobile terminal protection method, device and system
CN111885118A (en) * 2020-07-03 2020-11-03 上海钧正网络科技有限公司 Vehicle tracking method, vehicle tracking device, computer equipment and storage medium
CN112733048A (en) * 2021-01-20 2021-04-30 杭州云深科技有限公司 Tracking method of mobile device, electronic device, and medium

Similar Documents

Publication Publication Date Title
CN104486482A (en) Mobile terminal anti-theft tracking method
CN104486745A (en) Mobile terminal anti-theft tracking device
CN104540123B (en) The method and system of mobile terminal significant data encrypted backup and safety deleting
US9277391B2 (en) Pairing method between bluetooth devices and bluetooth system using the same
US20090183266A1 (en) Method and a system for recovering a lost or stolen electronic device
EP3816909A1 (en) Payment processing method for offline scenario, server, and readable storage medium
CN104144419A (en) Identity authentication method, device and system
EP2835997B1 (en) Cell phone data encryption method and decryption method
CN104376274A (en) Mobile terminal payment interface protection method and device
CN107707746B (en) Management method of mobile terminal, electronic device and storage medium
CN104751105A (en) Fingerprint data verification method, fingerprint data verification device, related equipment and system
CN103914520A (en) Data query method, terminal equipment and server
CN106599115B (en) Data protection method, device and terminal
CN105224194A (en) A kind of data processing method and terminal
CN104751086A (en) Terminal anti-theft method
CN107133500A (en) The encryption method and mobile terminal of a kind of application program
US20160148488A1 (en) Distress identifier to cause an action
CN102932741A (en) Mobile phone antitheft tracking method and antitheft tracking mobile phone
CN103916471A (en) Information display method and device
CN105678143A (en) Methods and devices for setting and acquiring electronic business card
CN104053137A (en) Data recovery method and device
CN107577933B (en) Application login method and device, computer equipment and computer readable storage medium
US20190020675A1 (en) Digital dye packs
WO2010067263A2 (en) A system for protection and backup of information in a mobile cell unit
CN106101193B (en) Information backup method, terminal equipment, operator server and backup system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20150401

RJ01 Rejection of invention patent application after publication