CN105635488A - Mobile terminal antitheft processing method and device - Google Patents

Mobile terminal antitheft processing method and device Download PDF

Info

Publication number
CN105635488A
CN105635488A CN201610154011.4A CN201610154011A CN105635488A CN 105635488 A CN105635488 A CN 105635488A CN 201610154011 A CN201610154011 A CN 201610154011A CN 105635488 A CN105635488 A CN 105635488A
Authority
CN
China
Prior art keywords
mobile terminal
sim card
media interviews
control address
card information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610154011.4A
Other languages
Chinese (zh)
Inventor
陈再成
伏奎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201610154011.4A priority Critical patent/CN105635488A/en
Publication of CN105635488A publication Critical patent/CN105635488A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/183Processing at user equipment or user record carrier

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Human Computer Interaction (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention belongs to the technical field of a mobile terminal and discloses a mobile terminal antitheft processing method and device. The method comprises the following steps: when detecting a mobile terminal is started, obtaining a media access control address of the mobile terminal, and searching a server to judge whether the server has the media access control address; if so, judging whether currently-used SIM card information is matched with information of the media access control address in the server; if not, storing the currently-used SIM card information, account information of a current user and the media access control address and mapping relations between the three to the server; and determining whether the mobile terminal is stolen according to the matching result. The method can accurately determine whether the mobile terminal is stolen, and antitheft confirmation does not fail with the operation of restoring factory settings or reinstalling the system and the like, thereby cracking down the mobile phone stealing behaviors from the source, and protecting property safety and personal information of the user.

Description

The method of a kind of guarding against theft for mobile terminal process and equipment
Technical field
The present invention relates to technical field of mobile terminals, particularly relate to method and the equipment of the process of a kind of guarding against theft for mobile terminal.
Background technology
Along with the develop rapidly of communication technology, the user of mobile telephone gets more and more, and particularly smart phone user number is increasing sharply. Smart mobile phone not only has the dialing of non intelligent mobile phone, receives calls, and sends, receives the function of note, and is provided with the social software of individual, payment software, individual privacy etc., become people live in an indispensable part. Along with the swift and violent increase of smart phone user quantity, the consequent is that mobile phone loss event also gets more and more, and has plenty of user and loses, but is more stolen. The loss of mobile equipment has brought a lot of trouble and inconvenience, sometimes or even very big loss.
Along with the fast development of information society, mobile equipment is in renewal, but mobile equipment does not but have very big breakthrough on theft preventing method. Whether current mobile equipment anti-theft processing method to carry out interpretation stolen if typically using IMEI and SIM card binding.
IMEI (InternationalMobileEquipmentIdentity, the international identify code of mobile equipment are also called international mobile equipment mark) is the unique identification number of mobile phone. IMEI is made up of 15 bit digital, and mobile phone, when producing, has just been endowed a globally unique IMEI. IMEI is the mark of difference mobile equipment, stores in a mobile device, can be used for monitoring stolen or invalid mobile equipment.
SIM (SubscriberIdentityModule, client identification module) blocks, and is also called subscriber identification card, smart card, and GSM digital mobile telephone must be loaded onto this card and can use. It stores the information of digital mobile phone client on computer chip, the contents such as the key of encryption and the telephone book of user, can differentiate for GSM network client identity, and voice encrypt information when client is conversed.
The technology of IMEI and SIM card binding is used to judge that whether mobile equipment is stolen at present, the method is simple, but the rising along with thief's state of the art, arranges as long as recovering to dispatch from the factory by mobile equipment or carries out brush machine operation, can eliminate the mapping relation of SIM card and IMEI information. After the mapping relation of SIM card and IMEI information is removed, the theft preventing method of this mobile equipment also just fails, and mobile equipment can not be prevented well stolen.
Summary of the invention
The present invention provides method and the equipment of a kind of guarding against theft for mobile terminal process, it is intended to solves existing anti-theft processing method and can not effectively prevent stolen.
First aspect present invention provides a kind of method that guarding against theft for mobile terminal processes, and the method comprises:
When detecting that mobile terminal is enabled, obtain the media interviews control address of described mobile terminal, and whether inquiry service device exists described media interviews control address;
If there is described media interviews control address, then judge whether the SIM card information that described the mobile terminal SIM card information currently used and the media interviews control address with current mobile terminal stored in described server map mutually mates;
If there is not described media interviews control address, then the mutual mapping relation between the SIM card information currently used by described mobile terminal, the account information of active user, described media interviews control address and three, is kept in described server;
Confirm that whether described mobile terminal is stolen according to described matching result.
Second aspect present invention provides a kind of method that terminal anti-theft processes, and the method comprises:
The media interviews control address that mobile terminal receive sends, and inquire about whether this locality stores the described media interviews control address received;
If there is described media interviews control address, whether the SIM card information that the SIM card information of the media interviews received described in detection control address maps mutually with the media interviews control address with current mobile terminal stored in this locality mates;
If there is not described media interviews control address, then by the mutual mapping relation between the account information of the SIM card information of transmission side, transmission side, the media interviews control address received and three, it is kept at this locality;
Confirm that whether the equipment of described transmission side is stolen according to described matching result, and return to transmission side.
Third aspect present invention provides the equipment that a kind of guarding against theft for mobile terminal processes, and comprising:
Inquiry module, for when detecting that mobile terminal is enabled, obtaining the media interviews control address of described mobile terminal, and whether inquiry service device exists described media interviews control address, if then sending and judging that instruction is to judging module, if not, then storage instruction is sent to memory module;
Memory module, for when receiving storage instruction, the mutual mapping relation between SIM card information, the account information of active user, described media interviews control address and three currently used by described mobile terminal, is sent to server and preserves;
Judge module, for, after receiving and judging instruction, whether the SIM card information that the SIM card information judging the current use of described mobile terminal and the media interviews control address with current mobile terminal stored in server map mutually mates;
Confirm module, for confirming that whether described mobile terminal is stolen according to the described matching result judged in module.
Fourth aspect present invention provides the equipment that a kind of guarding against theft for mobile terminal processes, and comprising:
Receiver module, for the media interviews control address that mobile terminal receive sends, and inquire about whether this locality stores the described media interviews control address received, if, then the media interviews received are controlled address and it is sent to detection module, otherwise, the media interviews received are controlled address and are sent to storer;
Storer, for the mutual mapping relation stored between the SIM card information of transmission side, the account information of transmission side, the media interviews control address received and three;
Detection module, for detecting whether the SIM card information mutually mapped from the SIM card information of the media interviews control address that described receiver module receives and the media interviews control address with current mobile terminal stored this locality mates;
For the matching result according to described detection module, result output module, confirms that whether the equipment of described transmission side is stolen, and result is exported to transmission side.
From above-mentioned embodiment of the present invention known, the present invention by controlling address and SIM card information and user account information and carry out binding by media interviews and stores in the server, the media interviews control address of himself is mated with the information stored in server by mobile terminal timing when enabling with SIM card information, and it is stolen to confirm as this mobile terminal when matching result occurs inconsistent. The method can determine that whether mobile terminal is stolen accurately; and can not dispatch from the factory because of recovery and arrange or carry out the behaviors such as brush machine operation and avoid antitheft confirmation; thus on source, hit the behavior of theft mobile phone, protect property safety and the personal information of user.
Accompanying drawing explanation
In order to be illustrated more clearly in the embodiment of the present invention or technical scheme of the prior art, it is briefly described to the accompanying drawing used required in embodiment or description of the prior art below, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those skilled in the art, under the prerequisite not paying creative work, it is also possible to obtain other accompanying drawing according to these accompanying drawings.
The realization flow schematic diagram of the guarding against theft for mobile terminal treatment process that Fig. 1 provides for first embodiment of the invention;
The realization flow schematic diagram of the guarding against theft for mobile terminal treatment process that Fig. 2 provides for second embodiment of the invention;
The realization flow schematic diagram of the terminal anti-theft treatment process that Fig. 3 provides for third embodiment of the invention;
The realization flow schematic diagram of the terminal anti-theft treatment process that Fig. 4 provides for fourth embodiment of the invention;
The structural representation of the equipment of the guarding against theft for mobile terminal process that Fig. 5 provides for fifth embodiment of the invention;
The structural representation of the equipment of the guarding against theft for mobile terminal process that Fig. 6 provides for sixth embodiment of the invention;
Fig. 7 is the structural representation of the equipment of the guarding against theft for mobile terminal process that seventh embodiment of the invention provides;
Fig. 8 is the structural representation of the equipment of the guarding against theft for mobile terminal process that eighth embodiment of the invention provides.
Embodiment
For making goal of the invention, the feature of the present invention, advantage can be more obvious and understandable, below in conjunction with the accompanying drawing in the embodiment of the present invention, technical scheme in the embodiment of the present invention is clearly and completely described, display, described embodiment is only the present invention's part embodiment, and not all embodiments. Based on the embodiment in the present invention, those skilled in the art, not making other embodiments all obtained under creative work prerequisite, belong to the scope of protection of the invention.
Referring to Fig. 1, the realization flow schematic diagram of the method for the guarding against theft for mobile terminal process that Fig. 1 provides for first embodiment of the invention, mainly comprises the following steps:
S101, when detecting that mobile terminal is enabled, obtain this mobile terminal media interviews control address (MediumAccessControl, MAC).
Media interviews control address is also called hardware address, or MAC address, is used for defining the position of the network equipment. In OSI model, third layer network layer is responsible for IP address, and second layer data link layer is then responsible for MAC address. Therefore a main frame has a MAC address, and each network site has the IP address that is specific to it. Media interviews control address length is 48 bits (6 bytes), it is made up of the numeral of 16 systems, it is divided into front 24 and latter 24: first 24 are called and organize unique identifier (OrganizationallyUniqueIdentifier, i.e. OUI), it is the code distributed to different manufacturers by the registration administration of IEEE, for distinguishing different producers. Latter 24 are distributed by producer oneself, are called extended identifier. In the network interface card of same manufacturer production behind MAC address 24 be different. That is, each mobile terminal can have self unique media interviews control address, and these media interviews control address can not disappear along with the renewal of device software or refitting or change.
MAC address is corresponding to the second layer data link layer of OSI reference model, the exchange board being operated in data link layer maintains the database of computer MAC address and self port, and exchange board carrys out forwarding data frame according to the target MAC (Media Access Control) address field in the data frame received. General, the media interviews control address of enabling and obtain of detection mobile terminal all is gone to perform by IP.
Whether S102, inquiry service device exist these media interviews control address.
A trace routine in mobile terminal detects whether mobile terminal starts, as startup detected, automatically read the MAC address of mobile terminal, then send an inquiry request to server, obtain from the reply message of server in server and whether have MAC address.
If there is these media interviews control address in S103 server, then judge whether the SIM card information that mobile terminal SIM (SubscriberIdentityModule, client identification module) the card information currently used and the media interviews control address with current mobile terminal stored in server map mutually mates.
In SIM card information, generally getting telephone number, the telephone number mapped by the mobile terminal telephone number currently used and the MAC address stored in server mates.
When mobile terminal-opening uses, IP can obtain the MAC address of mobile terminal automatically, and the MAC address got and SIM card information are mated with the MAC address in server and SIM card information, this detection carries out automatically, it is not necessary to user sends detection or performs an action. In the process that mobile terminal normally uses, IP also can regular visit server, now, default server stores MAC address and with MAC address map out of Memory.
If S104 server does not exist these media interviews control address, mutual mapping relation between the account information of the SIM card information that then currently used by mobile terminal, the account information of active user, media interviews control address and SIM card information, active user, media interviews control address three, preserves in the server.
The mutual mapping relation that the account information of SIM card information, active user, media interviews control between the three of address generates in the server, mutual mapping relation between three and the one-to-one relationship between three, by searching one of them, it is possible to other two information in correspondence.
User account information is the account name of user's registration when initial use, the account, name associated with MAC address, and a mobile terminal only recognizes an account name, namely initial user is after have registered account name, just can not revise or change account name by same mobile terminal. Password and the certificate information of some individuals of binding can be set according to account name, such as, ID card No., credit card, bank card etc.
In the information stored in the server, comprise the telephone number of SIM card, MAC address, some personal information of associating with account name of account name of the initial user of this mobile equipment and the mapping relation between telephone number, MAC address and this three of account name. It is one to one that mapping relation between this three determines between these three information, namely, in the server by inquiry MAC address, corresponding account name unique with it and SIM card information can be found, equally, by input SIM card information, corresponding MAC address unique with it and account name can be found.
Generally, server is given tacit consent to MAC address can corresponding multiple SIM card information, such as, two, three or four, but should control at a rational quantitative range, change SIM card with the use or user facilitating a machine double card. But the MAC address of each mobile terminal is unique, account name is also unique. Like this, when user changes SIM card but not mobile terminal is stolen, it may also be useful to the SIM card information of replacing can be associated by person with the account name of this mobile terminal, in case occurring thinking by mistake stolen.
S105, according to matching result confirm mobile terminal whether stolen.
If the SIM card information that the MAC address got and SIM card information map with the MAC address stored in server is not mated, then confirm that this mobile terminal is stolen.
In the embodiment of the present invention, by by MAC address, SIM card information, user account information and three is bound generation mutual mapping relational storage in the server, when mobile terminal uses, by obtaining the MAC address of mobile terminal, MAC address and SIM card information are mated with the information stored in server, thus confirms that whether mobile terminal is stolen. The method of this antitheft process is wider than existing anti-theft processing method range of application, judges more accurate.
Referring to Fig. 2, the realization flow schematic diagram of the method for the guarding against theft for mobile terminal process that Fig. 2 provides for second embodiment of the invention, mainly comprises the following steps:
S201, when detecting that mobile terminal is enabled, obtain mobile terminal media interviews control address.
When IP detects that mobile terminal is enabled, automatically obtain media interviews control address, i.e. the MAC address of this mobile terminal.
Whether S202, inquiry service device exist media interviews control address.
Mobile terminal is wirelessly connected with server, when IP gets MAC address, is automatically connected to server carries out whether storing the MAC address got in inquiry service device. When inquiring about in the server less than corresponding MAC address, it is considered that mobile terminal is new installation, it is in the state of first use. When server has MAC address, the different user account information that again can not write MAC address in server and associate from this MAC address.
S203, the SIM card information currently used by mobile terminal, the user account information of current user, media interviews control the mutual mapping relation between address and three, and preserve in the server. The user account information of current user and the account information of active user.
User account information is the account name of user's registration when initial use, the account, name associated with MAC address, and a corresponding unique account name of mobile terminal, namely initial user is after login account name, can not just same mobile terminal amendment or change account name, the account name concerning this mobile equipment, there is uniqueness. Password and the certificate information of some individuals of binding can be set according to account name, such as, ID card No., credit card, bank card etc.
In the information stored in the server, comprise the telephone number of SIM card, MAC address, some personal information of associating with account name of account name of the initial user of this mobile equipment and the mapping relation between telephone number, MAC address and this three of account name. It is one to one that mapping relation between this three determines between these three information, namely, in the server by inquiry MAC address, corresponding account name unique with it and SIM card information can be found, equally, by input SIM card information, corresponding MAC address unique with it and account name can be found.
Generally, server is given tacit consent to MAC address can corresponding multiple SIM card information, such as, two, three or four, but should control at a rational quantitative range, change SIM card with the use or user facilitating a machine double card. But the MAC address of each mobile terminal is unique, account name is also unique. Like this, when user changes SIM card but not mobile terminal is stolen, it may also be useful to the SIM card information of replacing can be associated by person with the account name of this mobile terminal, in case occurring thinking by mistake stolen. When needing MAC address correspondence two SIM card information made in server, when storing the 2nd SIM card information, the account name that needs input identical with first SIM card information and input some completely identical confirmations stored before, such as, the information such as password, bank card number.
Whether the SIM card information that S204, the SIM card information judging mobile terminal and currently using and the media interviews control address with current mobile terminal stored in server map mutually mates.
In SIM card information, generally getting telephone number, the telephone number mapped by the mobile terminal telephone number currently used and the MAC address got and the identical MAC address stored in server mates.
When mobile terminal-opening uses, IP can obtain the MAC address of mobile terminal automatically, and the MAC address got and SIM card information are mated with the MAC address in server and SIM card information, this detection carries out automatically, it is not necessary to user sends detection or performs an action. In the process that mobile terminal normally uses, IP also can regular visit server, now, default server stores MAC address and with MAC address map out of Memory.
The SIM card information that the media interviews control address of S205, current mobile terminal maps mutually comprises: the account information of SIM card information, user and media interviews control address, and mutually maps between three.
The user account information of user comprises user's account, the corresponding unique user's account in media interviews control address of mobile terminal, and this user's account is once storage in the server, can not modify, and change or delete. Namely the user's account giving tacit consent to typing first is legal user's account.
Whether the telephone number in the SIM card information that telephone number in S206, the SIM card information judging mobile terminal and currently using and corresponding media interviews control address map is completely identical. If matching result is completely identical, then perform S207; If matching result is different, then perform S208.
When mobile terminal-opening, IP understands the MAC address that oneself obtains mobile terminal, mates with the data stored in server, in use, the MAC address that IP also can sporadically obtain mobile terminal is mated with the data stored in server, stolen to judge whether.
Give for change after S207, confirmation mobile terminal are not stolen or stolen.
Now, judge that whether the telephone number that the telephone number of the SIM card that mobile terminal currently uses and the identical MAC address stored in server map is completely identical, if same MAC address is mapped with two telephone numbers, the telephone number only needing mobile terminal currently to use is identical with one of them telephone number, then confirm that this mobile terminal is given for change after not stolen or stolen.
S208, confirmation mobile terminal are stolen.
Specifically, the telephone number that the telephone number that mobile terminal currently uses maps from the MAC address of the mobile terminal of the current use stored in server is different, then think that mobile terminal is stolen.
After confirming that mobile terminal is stolen, it is possible to be connected to server by the mode of particular webpage and input account name, locked by this mobile terminal, make thief can not use this mobile terminal or the software and data installed can not be opened on mobile terminal. Server can also be connected to by network, be undertaken copying or deleting by the information in mobile terminal.
In the embodiment of the present invention, by by MAC address, SIM card information, user account information and three is bound generation mutual mapping relational storage in the server, when mobile terminal uses, by obtaining the MAC address of mobile terminal, MAC address and SIM card information are mated with the information stored in server, thus confirms that whether mobile terminal is stolen. The method of this antitheft process is wider than the anti-theft processing method range of application of existing use IMEI and SIM card information binding, judges more accurate.
Referring to Fig. 3, Fig. 3 is the realization flow schematic diagram of the terminal anti-theft treatment process that third embodiment of the invention provides, and mainly comprises the following steps:
The media interviews control address that S301, mobile terminal receive send.
Media interviews control address is also called hardware address, physical address or MAC address. MAC address is corresponding to the second layer data link layer of OSI reference model, and the exchange board being operated in data link layer maintains the database of MAC address and self port, and exchange board carrys out forwarding data frame according to the target MAC (Media Access Control) address field in the data frame received. General, enabling of detection mobile terminal all is gone to perform by IP with receiving media accessing to control address, by IP, media interviews is controlled address and is sent to server.
Whether S302, inquiry this locality store media interviews control address (MAC address) received, if storing MAC address, then forward S303 to; If there is no store M AC address, then forward S304 to.
After server receives MAC address, can automatically start polling routine and inquire about whether this locality stores MAC address.
Whether the SIM card information that the SIM card information of the media interviews control address that S303, detection receive maps mutually with the media interviews control address with current mobile terminal stored in this locality mates.
In SIM card information, generally getting telephone number, the telephone number that the telephone number that the mobile terminal being about to receive currently uses maps with the MAC address stored in server mates.
When mobile terminal-opening uses, IP automatically can obtain the MAC address of mobile terminal and send server, the MAC address being currently received and SIM card information are mated by server with MAC address and the SIM card information of storage original in server, this detection carries out automatically, it is not necessary to user sends detection or performs an action. In the process that mobile terminal normally uses, server meeting regular visit mobile terminal, now, the out of Memory storing MAC address in default server and mapping with MAC address.
S304, by the account information of the SIM card information of transmission side, transmission side, receive media interviews control address and three between mutual mapping relation, be kept at this locality. Mutual mapping relation between the SIM card information of transmission side, the account information of transmission side, the media interviews received control this three of address generates in the server, this maps relation mutually makes one_to_one corresponding between three, by searching one of them, it is possible to get other information of two.
The account information of transmission side is the account name of user's registration when initial use, the account, name associated with MAC address, and a mobile terminal only recognizes an account name, namely initial user is after have registered account name, just can not revise or change account name by same mobile terminal. Password and the certificate information of some individuals of binding can be set according to account name, such as, ID card No., credit card, bank card etc.
In the information stored in the server, comprise the telephone number of SIM card, MAC address, some personal information of associating with account name of account name of the initial user of this mobile equipment and the mapping relation between telephone number, MAC address and this three of account name. It is one to one that mapping relation between this three determines between these three information, namely, in the server by inquiry MAC address, corresponding account name unique with it and SIM card information can be found, equally, by input SIM card information, corresponding MAC address unique with it and account name can be found.
Generally, server is given tacit consent to MAC address can corresponding multiple SIM card information, such as, two, three or four, but should control at a rational quantitative range, change SIM card with the use or user facilitating a machine double card. But the MAC address of each mobile terminal is unique, account name is also unique. Like this, when user changes SIM card but not mobile terminal is stolen, it may also be useful to the SIM card information of replacing can be associated by person with the account name of this mobile terminal, in case occurring thinking by mistake stolen.
S305, whether stolen according to the equipment of matching result acknowledged, and return to transmission side.
If the SIM card information that the MAC address got and SIM card information map with the MAC address stored in server is not mated, then confirm that this mobile terminal is stolen.
In the embodiment of the present invention, by by the accounts information of MAC address, SIM card information, transmission side and three is bound generation mutual mapping relational storage in the server, when mobile terminal uses, by obtaining the MAC address of mobile terminal, MAC address and SIM card information are mated with the information stored in server, thus confirms that whether mobile terminal is stolen. The method of this antitheft process is wider than existing anti-theft processing method range of application, judges more accurate.
Referring to Fig. 4, Fig. 4 is the realization flow schematic diagram of the method for the terminal anti-theft process that fourth embodiment of the invention provides, and mainly comprises the following steps:
The media interviews control address that S401, mobile terminal receive send.
Whether S402, inquiry this locality store the media interviews control address received.
S403, by the account information of the SIM card information of transmission side, transmission side, receive media interviews control address and three between mutual mapping relation, be kept at this locality.
Whether the SIM card information that the SIM card information of the media interviews control address that S404, detection receive maps mutually with the media interviews control address of the current mobile terminal stored in this locality mates.
The SIM card information that the media interviews control address of S405, current mobile terminal maps mutually comprises: the account information of SIM card information, transmission side and media interviews control address, and mutually maps between three.
Whether the telephone number in the SIM card information that the telephone number in the SIM card information of the media interviews control address that S406, detection receive and the media interviews control address received map is completely identical, if matching result is completely identical, then forwards S407 to; If matching result is different, then forward S408 to.
Give for change after the equipment of S407, acknowledged is not stolen or stolen.
The equipment of S408, acknowledged is stolen.
The associated viscera of each step in embodiment 4, please refer to the associated viscera in embodiment 3, no longer paralympic herein repeats.
In the embodiment of the present invention, by by MAC address, SIM card information, user account information and three is bound generation mutual mapping relational storage in the server, when mobile terminal uses, by obtaining the MAC address of mobile terminal, MAC address and SIM card information are mated with the information stored in server, thus confirms that whether mobile terminal is stolen. The method of this antitheft process is wider than existing anti-theft processing method range of application, judges more accurate.
Referring to Fig. 5, Fig. 5 is the structural representation of the equipment of the guarding against theft for mobile terminal process that fifth embodiment of the invention provides, and for convenience of explanation, illustrate only the part relevant to the embodiment of the present invention. The equipment of the guarding against theft for mobile terminal process of Fig. 5 example can be the executive agent of guarding against theft for mobile terminal treatment process of earlier figures 1 and offer embodiment illustrated in fig. 2, it is possible to is a control module in intelligence equipment or intelligence equipment. The equipment of the guarding against theft for mobile terminal process of Fig. 5 example, mainly comprises: inquires about module 501, memory module 502, judge module 503 and confirms module 504. Each function module is described in detail as follows above:
Inquiry module 501 is for when detecting that mobile terminal is enabled, obtaining the media interviews control address of mobile terminal, and whether inquiry service device exists media interviews control address, if, then send and judge that instruction is to judging module 503, if not, then send and store instruction to memory module 502.
When IP detects that mobile terminal is enabled, inquiry module 501 obtains media interviews control address, i.e. the MAC address of this mobile terminal automatically.
Mobile terminal is wirelessly connected with server, when IP gets MAC address, is automatically connected to server carries out whether storing the MAC address got in inquiry service device. When inquiring about in the server less than corresponding MAC address, it is considered that mobile terminal is new installation, it is in the state of first use. When server has MAC address, the different user account information that again can not write MAC address in server and associate from this MAC address.
Memory module 502 is for when receiving storage instruction, the mutual mapping relation between SIM card information, the account information of active user, media interviews control address and three currently used by mobile terminal, is sent to server and preserves.
User account information is the account name of user's registration when initial use, the account, name associated with MAC address, and a corresponding unique account name of mobile terminal, namely initial user is after login account name, can not just same mobile terminal amendment or change account name, the account name concerning this mobile equipment, there is uniqueness. Password and the certificate information of some individuals of binding can be set according to account name, such as, ID card No., credit card, bank card etc.
In the information stored in the server, comprise the telephone number of SIM card, MAC address, some personal information of associating with account name of account name of the initial user of this mobile equipment and the mapping relation between telephone number, MAC address and this three of account name. It is one to one that mapping relation between this three determines between these three information, namely, in the server by inquiry MAC address, corresponding account name unique with it and SIM card information can be found, equally, by input SIM card information, corresponding MAC address unique with it and account name can be found.
Generally, server is given tacit consent to MAC address can corresponding multiple SIM card information, such as, two, three or four, but should control at a rational quantitative range, change SIM card with the use or user facilitating a machine double card. But the MAC address of each mobile terminal is unique, account name is also unique. Like this, when user changes SIM card but not mobile terminal is stolen, it may also be useful to the SIM card information of replacing can be associated by person with the account name of this mobile terminal, in case occurring thinking by mistake stolen. When needing MAC address correspondence two SIM card information made in server, when storing the 2nd SIM card information, the account name that needs input identical with first SIM card information and input some completely identical confirmations stored before, such as, the information such as password, bank card number.
Judge module 503 is for, after receiving and judging instruction, whether the SIM card information that the SIM card information judging the current use of mobile terminal and the media interviews control address with current mobile terminal stored in server map mutually mates.
In SIM card information, generally getting telephone number, the telephone number mapped by the mobile terminal telephone number currently used and the MAC address got and the identical MAC address stored in server mates.
When mobile terminal-opening uses, IP can obtain the MAC address of mobile terminal automatically, and the MAC address got and SIM card information are mated with the MAC address in server and SIM card information, this detection carries out automatically, it is not necessary to user sends detection or performs an action. In the process that mobile terminal normally uses, IP also can regular visit server, now, default server stores MAC address and with MAC address map out of Memory.
Confirm according to the matching result judged in module 503, module 504 is for confirming that whether mobile terminal is stolen.
Confirm that whether the telephone number that module 504 judges that the telephone number of the SIM card that mobile terminal currently uses and the identical MAC address stored in server map is completely identical, if a MAC address is only mapped with a telephone number, then the telephone number that mobile terminal currently uses needs the telephone number mapped with MAC address in server completely identical. If same MAC address is mapped with two telephone numbers, it is only necessary to the telephone number that mobile terminal currently uses is identical with one of them telephone number, then confirm that this mobile terminal is given for change after not stolen or stolen.
The telephone number that the telephone number that mobile terminal currently uses maps from the MAC address of the mobile terminal of the current use stored in server is different, then think that mobile terminal is stolen.
After confirming that mobile terminal is stolen, it is possible to be connected to server by the mode of particular webpage and input account name, locked by this mobile terminal, make thief can not use this mobile terminal or the software and data installed can not be opened on mobile terminal. Server can also be connected to by network, be undertaken copying or deleting by the information in mobile terminal.
In the embodiment of the present invention, by by MAC address, SIM card information, user account information and three is bound generation mutual mapping relational storage in the server, when mobile terminal uses, by obtaining the MAC address of mobile terminal, MAC address and SIM card information are mated with the information stored in server, thus confirms that whether mobile terminal is stolen. The method of this antitheft process is wider than existing anti-theft processing method range of application, judges more accurate.
It should be noted that, in the enforcement mode of the equipment of the guarding against theft for mobile terminal process of above Fig. 5 example, the division of each function module is only illustrate, can be as required in practical application, the convenient consideration of the such as configuration requirement of corresponding hardware or the realization of software, and above-mentioned functions distribution is completed by different function modules, it is divided into different function modules by the internal structure of device of guarding against theft for mobile terminal process, to complete all or part of function described above. And, in practical application, the corresponding function module in the present embodiment can be by corresponding hardware implementing, it is also possible to performs corresponding software by corresponding hardware and completes. Each embodiment that this specification sheets provides all can apply foregoing description principle, below repeats no more.
Referring to Fig. 6, Fig. 6 is the structural representation of the equipment of the guarding against theft for mobile terminal process that sixth embodiment of the invention provides, and for convenience of explanation, illustrate only the part relevant to the embodiment of the present invention. The equipment of the guarding against theft for mobile terminal process of Fig. 6 example can be the executive agent of guarding against theft for mobile terminal treatment process of earlier figures 1 and offer embodiment illustrated in fig. 2, it is possible to is a control module in intelligence equipment or intelligence equipment. The equipment of the guarding against theft for mobile terminal process of Fig. 6 example, mainly comprises: inquiry module 601, memory module 602, information memory cell 603, matching unit 604 and confirmation module 605. Each function module is described in detail as follows above:
Inquiry module 601 is for when detecting that mobile terminal is enabled, obtaining the media interviews control address of mobile terminal, and whether inquiry service device exists media interviews control address, if, then send and judge that instruction is to information memory cell 603, if not, then send and store instruction to memory module 602.
When IP detects that mobile terminal is enabled, inquiry module 601 obtains media interviews control address, i.e. the MAC address of this mobile terminal automatically.
Mobile terminal is wirelessly connected with server, when IP gets MAC address, is automatically connected to server carries out whether storing the MAC address got in inquiry service device. When inquiring about in the server less than corresponding MAC address, it is considered that mobile terminal is new installation, it is in the state of first use. When server has MAC address, the different user account information that again can not write MAC address in server and associate from this MAC address.
Memory module 602 is for when receiving storage instruction, the mutual mapping relation between SIM card information, the account information of active user, media interviews control address and three currently used by mobile terminal, is sent to server and preserves.
User account information is the account name of user's registration when initial use, the account, name associated with MAC address, and a corresponding unique account name of mobile terminal, namely initial user is after login account name, can not just same mobile terminal amendment or change account name, the account name concerning this mobile equipment, there is uniqueness. Password and the certificate information of some individuals of binding can be set according to account name, such as, ID card No., credit card, bank card etc.
In the information stored in the server, comprise the telephone number of SIM card, MAC address, some personal information of associating with account name of account name of the initial user of this mobile equipment and the mapping relation between telephone number, MAC address and this three of account name. It is one to one that mapping relation between this three determines between these three information, namely, in the server by inquiry MAC address, corresponding account name unique with it and SIM card information can be found, equally, by input SIM card information, corresponding MAC address unique with it and account name can be found.
Generally, server is given tacit consent to MAC address can corresponding multiple SIM card information, such as, two, three or four, but should control at a rational quantitative range, change SIM card with the use or user facilitating a machine double card. But the MAC address of each mobile terminal is unique, account name is also unique. Like this, when user changes SIM card but not mobile terminal is stolen, it may also be useful to the SIM card information of replacing can be associated by person with the account name of this mobile terminal, in case occurring thinking by mistake stolen. When needing MAC address correspondence two SIM card information made in server, when storing the 2nd SIM card information, the account name that needs input identical with first SIM card information and input some completely identical confirmations stored before, such as, the information such as password, bank card number.
The SIM card information that information memory cell 603 maps mutually for storing the media interviews control address of current mobile terminal, is specially: the account information of SIM card information, active user, media interviews control mutually to map between address and three.
Telephone number in the SIM card information that matching unit 604 maps for the telephone number in the SIM card information currently used and corresponding media interviews control address mates.
In SIM card information, generally getting telephone number, the telephone number mapped by the mobile terminal telephone number currently used and the MAC address got and the identical MAC address stored in server mates.
When mobile terminal-opening uses, IP can obtain the MAC address of mobile terminal automatically, and the MAC address got and SIM card information are mated with the MAC address in server and SIM card information, this detection carries out automatically, it is not necessary to user sends detection or performs an action. In the process that mobile terminal normally uses, IP also can regular visit server, now, default server stores MAC address and with MAC address map out of Memory.
Confirm according to the matching result in matching unit 604, module 605 is for confirming that whether mobile terminal is stolen.
Confirm that whether the telephone number that module 605 judges that the telephone number of the SIM card that mobile terminal currently uses and the identical MAC address stored in server map is completely identical, if a MAC address is only mapped with a telephone number, then the telephone number that mobile terminal currently uses needs the telephone number mapped with MAC address in server completely identical. If same MAC address is mapped with two telephone numbers, it is only necessary to the telephone number that mobile terminal currently uses is identical with one of them telephone number, then confirm that this mobile terminal is given for change after not stolen or stolen.
The telephone number that the telephone number that mobile terminal currently uses maps from the MAC address of the mobile terminal of the current use stored in server is different, then think that mobile terminal is stolen.
After confirming that mobile terminal is stolen, it is possible to be connected to server by the mode of particular webpage and input account name, locked by this mobile terminal, make thief can not use this mobile terminal or the software and data installed can not be opened on mobile terminal. Server can also be connected to by network, be undertaken copying or deleting by the information in mobile terminal.
In the embodiment of the present invention, by by MAC address, SIM card information, user account information and three is bound generation mutual mapping relational storage in the server, when mobile terminal uses, by obtaining the MAC address of mobile terminal, MAC address and SIM card information are mated with the information stored in server, thus confirms that whether mobile terminal is stolen. The method of this antitheft process is wider than existing anti-theft processing method range of application, judges more accurate.
Referring to Fig. 7, Fig. 7 is the structural representation of the equipment of the guarding against theft for mobile terminal process that seventh embodiment of the invention provides, and for convenience of explanation, illustrate only the part relevant to the embodiment of the present invention. The equipment of the guarding against theft for mobile terminal process of Fig. 7 example can be the executive agent of terminal anti-theft treatment process of earlier figures 3 and offer embodiment illustrated in fig. 4, it is possible to is a control module in intelligence equipment or intelligence equipment. The equipment of the guarding against theft for mobile terminal process of Fig. 7 example, mainly comprises: receiver module 701, storer 702, detection module 703 and result output module 704. Each function module is described in detail as follows above:
The media interviews control address that receiver module 701 sends for mobile terminal receive, and inquire about whether this locality stores the media interviews control address received, if, then the media interviews received are controlled address and it is sent to detection module 703, otherwise, the media interviews received are controlled address and are sent to storer 702.
When IP detects that mobile terminal is enabled, inquiry module 501 obtains media interviews control address, i.e. the MAC address of this mobile terminal automatically.
Mobile terminal is wirelessly connected with server, when IP gets MAC address, is automatically connected to server carries out whether storing the MAC address got in inquiry service device. When inquiring about in the server less than corresponding MAC address, it is considered that mobile terminal is new installation, it is in the state of first use. When server has MAC address, the different user account information that again can not write MAC address in server and associate from this MAC address.
The mutual mapping relation of storer 702 for storing between the SIM card information of transmission side, the account information of transmission side, the media interviews control address received and three.
User account information is the account name of user's registration when initial use, the account, name associated with MAC address, and a corresponding unique account name of mobile terminal, namely initial user is after login account name, can not just same mobile terminal amendment or change account name, the account name concerning this mobile equipment, there is uniqueness. Password and the certificate information of some individuals of binding can be set according to account name, such as, ID card No., credit card, bank card etc.
In the information stored in the server, comprise the telephone number of SIM card, MAC address, some personal information of associating with account name of account name of the initial user of this mobile equipment and the mapping relation between telephone number, MAC address and this three of account name. It is one to one that mapping relation between this three determines between these three information, namely, in the server by inquiry MAC address, corresponding account name unique with it and SIM card information can be found, equally, by input SIM card information, corresponding MAC address unique with it and account name can be found.
Generally, server is given tacit consent to MAC address can corresponding multiple SIM card information, such as, two, three or four, but should control at a rational quantitative range, change SIM card with the use or user facilitating a machine double card. But the MAC address of each mobile terminal is unique, account name is also unique. Like this, when user changes SIM card but not mobile terminal is stolen, it may also be useful to the SIM card information of replacing can be associated by person with the account name of this mobile terminal, in case occurring thinking by mistake stolen. When needing MAC address correspondence two SIM card information made in server, when storing the 2nd SIM card information, the account name that needs input identical with first SIM card information and input some completely identical confirmations stored before, such as, the information such as password, bank card number.
Whether the SIM card information that detection module 703 maps from the SIM card information of the media interviews control address that receiver module 701 receives and the media interviews control address with current mobile terminal stored this locality mutually for detecting mates.
In SIM card information, generally getting telephone number, the telephone number mapped by the mobile terminal telephone number currently used and the MAC address got and the identical MAC address stored in server mates.
When mobile terminal-opening uses, IP can obtain the MAC address of mobile terminal automatically, and the MAC address got and SIM card information are mated with the MAC address in server and SIM card information, this detection carries out automatically, it is not necessary to user sends detection or performs an action. In the process that mobile terminal normally uses, IP also can regular visit server, now, default server stores MAC address and with MAC address map out of Memory.
Whether result output module 704 is stolen for the equipment of the matching result acknowledged according to detection module 703, and result is exported to transmission side.
Result output module 704 judges that whether the telephone number that the telephone number of the SIM card that mobile terminal currently uses and the identical MAC address stored in server map is completely identical, if a MAC address is only mapped with a telephone number, then the telephone number that mobile terminal currently uses needs the telephone number mapped with MAC address in server completely identical. If same MAC address is mapped with two telephone numbers, it is only necessary to the telephone number that mobile terminal currently uses is identical with one of them telephone number, then confirm that this mobile terminal is given for change after not stolen or stolen.
The telephone number that the telephone number that mobile terminal currently uses maps from the MAC address of the mobile terminal of the current use stored in server is different, then think that mobile terminal is stolen.
After confirming that mobile terminal is stolen, it is possible to be connected to server by the mode of particular webpage and input account name, locked by this mobile terminal, make thief can not use this mobile terminal or the software and data installed can not be opened on mobile terminal. Server can also be connected to by network, be undertaken copying or deleting by the information in mobile terminal.
In the embodiment of the present invention, by by MAC address, SIM card information, user account information and three is bound generation mutual mapping relational storage in the server, when mobile terminal uses, by obtaining the MAC address of mobile terminal, MAC address and SIM card information are mated with the information stored in server, thus confirms that whether mobile terminal is stolen. The method of this antitheft process is wider than existing anti-theft processing method range of application, judges more accurate.
Referring to Fig. 8, Fig. 8 is the structural representation of the equipment of the guarding against theft for mobile terminal process that eighth embodiment of the invention provides, and for convenience of explanation, illustrate only the part relevant to the embodiment of the present invention. The equipment of the guarding against theft for mobile terminal process of Fig. 8 example can be the executive agent of terminal anti-theft treatment process of earlier figures 3 and offer embodiment illustrated in fig. 4, it is possible to is a control module in intelligence equipment or intelligence equipment. The equipment of the guarding against theft for mobile terminal process of Fig. 8 example, mainly comprises: receiver module 801, storer 802, storing sub-units 803, detection sub-unit 804 and result output module 804. Each function module is described in detail as follows above:
The media interviews control address that receiver module 801 sends for mobile terminal receive, and inquire about whether this locality stores the media interviews control address received, if, then the media interviews received are controlled address and it is sent to storing sub-units 803, otherwise, the media interviews received are controlled address and are sent to storer 802.
The mutual mapping relation of storer 802 for storing between the SIM card information of transmission side, the account information of transmission side, the media interviews control address received and three.
Storing sub-units 803, for storing the information of the SIM card that current mobile terminal media interviews control address maps mutually, is specially: account information, the media interviews of SIM card information, transmission side control the mutual mapping relation between address and three.
In storer 802, the user account information of the side of transmission comprises user's account, the corresponding unique user's account in media interviews control address received.
Whether the telephone number in the SIM card information that the telephone number in the SIM card information of the media interviews control address that detection sub-unit 804 receives for detecting and the media interviews control address being stored in storing sub-units 803 map is completely identical.
Whether result output module 704 is stolen for the equipment of the matching result acknowledged according to detection module 703, and result is exported to transmission side.
The details that the present embodiment is not most, refers to earlier figures 4 and description embodiment illustrated in fig. 8, repeats no more herein.
In several embodiments that the application provides, it should be appreciated that, disclosed device and method, it is possible to realize by another way. Such as, device embodiment described above is only schematic, such as, the division of described module, being only a kind of logic function to divide, actual can have other dividing mode when realizing, such as multiple module or assembly can in conjunction with or another system can be integrated into, or some features can ignore, or do not perform. Another point, shown or discussed coupling each other or directly coupling or communication connection can be the indirect coupling by some interfaces, device or module or communication connection, it is possible to be electrical, machinery or other form.
The described module illustrated as separating component can or may not be physically separates, and the parts as module display can be or may not be physics module, namely can be positioned at a place, or can also be distributed in multiple network module. Some or all of module wherein can be selected according to the actual needs to realize the object of the present embodiment scheme.
In addition, each function module in each embodiment of the present invention can be integrated in a processing module, it is also possible to is that the independent physics of each module exists, it is also possible to two or more module integrations are in a module. Above-mentioned integrated module both can adopt the form of hardware to realize, it is also possible to adopts the form of software function module to realize.
If described integrated module realize using the form of software function module and as independent production marketing or when using, it is possible to be stored in a computer read/write memory medium. Based on such understanding, the technical scheme of the present invention in essence or says that part prior art contributed or all or part of of this technical scheme can embody with the form of software product, this computer software product is stored in a storage media, comprise some instructions with so that a computer equipment (can be Personal Computer, server, or the network equipment etc.) perform all or part of step of method described in each embodiment of the present invention. And aforesaid storage media comprises: USB flash disk, portable hard drive, read-only storage (ROM, Read-OnlyMemory), random access memory (RAM, RandomAccessMemory), magnetic disc or CD etc. various can be program code stored medium.
It should be noted that, for aforesaid each embodiment of the method, in order to simplicity describes, therefore it is all expressed as a series of combination of actions, but those skilled in the art should know, the present invention is not by the restriction of described sequence of operation, because according to the present invention, some step can adopt other order or carry out simultaneously. Secondly, those skilled in the art also should know, the embodiment described in specification sheets all belongs to preferred embodiment, and involved action and module might not be all that the present invention is necessary.
In the above-described embodiments, the description of each embodiment is all emphasized particularly on different fields, certain embodiment there is no the part described in detail, it is possible to see the associated description of other embodiment.
It it is more than the description to a kind of guarding against theft for mobile terminal treatment process provided by the present invention, equipment and device, for the technician of this area, according to the thought of the embodiment of the present invention, all will change in specific embodiments and applications, to sum up, this description should not be construed as limitation of the present invention.

Claims (14)

1. the method for a guarding against theft for mobile terminal process, it is characterised in that, described method comprises:
When detecting that mobile terminal is enabled, obtain the media interviews control address of described mobile terminal, and whether inquiry service device exists described media interviews control address;
If there is described media interviews control address, then judge whether the SIM card information that described the mobile terminal SIM card information currently used and the media interviews control address with current mobile terminal stored in described server map mutually mates;
If there is not described media interviews control address, then the mutual mapping relation between the SIM card information currently used by described mobile terminal, the account information of active user, described media interviews control address and three, is kept in described server;
Confirm that whether described mobile terminal is stolen according to described matching result.
2. method according to claim 1, it is characterized in that, whether the described SIM card information judging that the mobile terminal SIM card information currently used and the media interviews control address with current mobile terminal stored in described server map mutually mates, and specifically comprises:
Judge that whether the telephone number in the SIM card information that the telephone number in the SIM card information that described mobile terminal currently uses and corresponding media interviews control address map is completely identical.
3. method according to claim 1, it is characterised in that, the account information of described active user comprises user's account, the corresponding unique user's account in media interviews control address of described mobile terminal.
4. method according to claim 1, it is characterised in that, confirm that whether described mobile terminal is stolen according to described matching result, specifically comprise:
If matching result is completely identical, then confirm that described mobile terminal is given for change after not stolen or stolen;
If matching result is different, then confirm that described mobile terminal is stolen.
5. the method for a terminal anti-theft process, it is characterised in that, the method comprises:
The media interviews control address that mobile terminal receive sends, and inquire about whether this locality stores the described media interviews control address received;
If there is described media interviews control address, whether the SIM card information that the SIM card information of the media interviews received described in detection control address maps mutually with the media interviews control address with current mobile terminal stored in this locality mates;
If there is not described media interviews control address, then by the mutual mapping relation between the account information of the SIM card information of transmission side, transmission side, the media interviews control address received and three, it is kept at this locality;
Confirm that whether the equipment of described transmission side is stolen according to described matching result, and return to transmission side.
6. method according to claim 5, it is characterized in that, whether the SIM card information that the SIM card information of the media interviews control address received described in detection maps mutually with the media interviews control address of the current mobile terminal stored in this locality mates, and specifically comprises:
Whether the telephone number in the SIM card information that the telephone number in the SIM card information of the media interviews control address received described in detection and the media interviews control address received map is completely identical.
7. method according to claim 5, it is characterised in that, the account information of described transmission side comprises user's account, described in the corresponding unique user's account in media interviews control address received.
8. method according to claim 5, it is characterised in that, confirm that whether the equipment of described transmission side is stolen according to described matching result, specifically comprise:
If matching result is completely identical, then the equipment of acknowledged not stolen or stolen after give for change;
If matching result is different, then the equipment of acknowledged is stolen.
9. the equipment of a guarding against theft for mobile terminal process, it is characterised in that, comprising:
Inquiry module, for when detecting that mobile terminal is enabled, obtaining the media interviews control address of described mobile terminal, and whether inquiry service device exists described media interviews control address, if then sending and judging that instruction is to judging module, if not, then storage instruction is sent to memory module;
Memory module, for when receiving storage instruction, the mutual mapping relation between SIM card information, the account information of active user, described media interviews control address and three currently used by described mobile terminal, is sent to server and preserves;
Judge module, for, after receiving and judging instruction, whether the SIM card information that the SIM card information judging the current use of described mobile terminal and the media interviews control address with current mobile terminal stored in server map mutually mates;
Confirm module, for confirming that whether described mobile terminal is stolen according to the described matching result judged in module.
10. equipment according to claim 9, it is characterised in that, described judgement module comprises matching unit,
The telephone number that described matching unit is used for the telephone number in the SIM card information currently used and corresponding media interviews being controlled in the SIM card information of address mapping mates.
11. equipment according to claim 9, it is characterised in that, the account information of described active user comprises user's account, the corresponding unique user's account in media interviews control address of described mobile terminal.
The equipment of 12. 1 kinds of guarding against theft for mobile terminal process, it is characterised in that, comprising:
Receiver module, for the media interviews control address that mobile terminal receive sends, and inquire about whether this locality stores the described media interviews control address received, if, then the media interviews received are controlled address and it is sent to detection module, otherwise, the media interviews received are controlled address and are sent to storer;
Storer, for the mutual mapping relation stored between the SIM card information of transmission side, the account information of transmission side, the media interviews control address received and three;
Detection module, for detecting whether the SIM card information mutually mapped from the SIM card information of the media interviews control address that described receiver module receives and the media interviews control address with current mobile terminal stored this locality mates;
For the matching result according to described detection module, result output module, confirms that whether the equipment of described transmission side is stolen, and result is exported to transmission side.
13. equipment according to claim 12, it is characterised in that, described detection module comprises detection sub-unit,
Whether the telephone number in the SIM card information that the telephone number in the SIM card information of the media interviews control address that described detection sub-unit receives for detecting and the media interviews control address being stored in storing sub-units map is completely identical.
14. equipment according to claim 12, it is characterised in that, in described storer, the account information of the side of transmission comprises user's account, described in the corresponding unique user's account in media interviews control address received.
CN201610154011.4A 2016-03-17 2016-03-17 Mobile terminal antitheft processing method and device Pending CN105635488A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610154011.4A CN105635488A (en) 2016-03-17 2016-03-17 Mobile terminal antitheft processing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610154011.4A CN105635488A (en) 2016-03-17 2016-03-17 Mobile terminal antitheft processing method and device

Publications (1)

Publication Number Publication Date
CN105635488A true CN105635488A (en) 2016-06-01

Family

ID=56049950

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610154011.4A Pending CN105635488A (en) 2016-03-17 2016-03-17 Mobile terminal antitheft processing method and device

Country Status (1)

Country Link
CN (1) CN105635488A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106488443A (en) * 2016-06-30 2017-03-08 深圳市美贝壳科技有限公司 A kind of method protecting data in mobile phone with home intelligent equipment
CN109005183A (en) * 2018-08-15 2018-12-14 深圳市泰钦园贸易有限公司 A kind of information anti-lost method based on chip ID number and network/MAC address

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103188672A (en) * 2011-12-28 2013-07-03 宇龙计算机通信科技(深圳)有限公司 Mobile terminal and data protection method thereof
WO2014029443A1 (en) * 2012-08-23 2014-02-27 Telefonaktiebolaget L M Ericsson (Publ) Access control for a wireless local area network
CN103648089A (en) * 2013-11-07 2014-03-19 北京奇虎科技有限公司 Anti-theft processing method and anti-theft processing device for mobile equipment
CN104754556A (en) * 2013-12-25 2015-07-01 阿里巴巴集团控股有限公司 Method and device for maintaining effectiveness of mobile terminal, method and device for uploading information of mobile terminal as well as system for maintaining effectiveness of mobile terminal
WO2015131705A1 (en) * 2014-10-17 2015-09-11 中兴通讯股份有限公司 Security method, security device and computer storage medium
CN105100131A (en) * 2014-04-25 2015-11-25 北京奇虎科技有限公司 Terminal device and terminal device theft prevention method and system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103188672A (en) * 2011-12-28 2013-07-03 宇龙计算机通信科技(深圳)有限公司 Mobile terminal and data protection method thereof
WO2014029443A1 (en) * 2012-08-23 2014-02-27 Telefonaktiebolaget L M Ericsson (Publ) Access control for a wireless local area network
CN103648089A (en) * 2013-11-07 2014-03-19 北京奇虎科技有限公司 Anti-theft processing method and anti-theft processing device for mobile equipment
CN104754556A (en) * 2013-12-25 2015-07-01 阿里巴巴集团控股有限公司 Method and device for maintaining effectiveness of mobile terminal, method and device for uploading information of mobile terminal as well as system for maintaining effectiveness of mobile terminal
CN105100131A (en) * 2014-04-25 2015-11-25 北京奇虎科技有限公司 Terminal device and terminal device theft prevention method and system
WO2015131705A1 (en) * 2014-10-17 2015-09-11 中兴通讯股份有限公司 Security method, security device and computer storage medium

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106488443A (en) * 2016-06-30 2017-03-08 深圳市美贝壳科技有限公司 A kind of method protecting data in mobile phone with home intelligent equipment
CN109005183A (en) * 2018-08-15 2018-12-14 深圳市泰钦园贸易有限公司 A kind of information anti-lost method based on chip ID number and network/MAC address
CN109005183B (en) * 2018-08-15 2020-10-09 深圳市泰钦园贸易有限公司 Information anti-loss method based on chip ID number and network MAC address

Similar Documents

Publication Publication Date Title
CN102497635B (en) Server, terminal and account password acquisition method
US20090298468A1 (en) System and method for deleting data in a communication device
CN102413221B (en) Method for protecting privacy information and mobile terminal
EP2611226B1 (en) Processing method and system for over-the-air bootstrap
CN104601324A (en) Verification method specific to applications, terminal and system
CN104702760A (en) Communication number updating method and device
US11575671B2 (en) Network ID device history and mobile account attributes used as a risk indicator in mobile network-based authentication
CN105260660A (en) Monitoring method, device and system of intelligent terminal payment environment
CN104486716A (en) Method and device for showing bluetooth name
CN106488394A (en) A kind of method and device of equipment connection
CN106465076A (en) Control method and terminal for short message reading
CN104980420A (en) Business processing method, device, terminal and server
CN105635488A (en) Mobile terminal antitheft processing method and device
CN104683290A (en) Method and device for monitoring phishing and terminal
CN105163312A (en) Wireless network access method and wireless network access device
CN112286911B (en) Database management method and device, equipment and storage medium
CN103929469A (en) Internet of Things management platform of eUICC and mobile number remote management method
CN109151790B (en) Bluetooth device connection method and system based on network security
CN102346822B (en) Traceable mobile storage device, system and tracking method
CN107396295B (en) Method and equipment for carrying out wireless connection pre-authorization on user equipment
CN112702743B (en) Network data monitoring and protecting method based on artificial intelligence
CN104995635A (en) Image transmission method, device and terminal device
CN106101193B (en) Information backup method, terminal equipment, operator server and backup system
US11109189B2 (en) System and method for retrieving lost electronic device
CN106211163A (en) The method and apparatus of safe networking

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20160601