CN106909861A - A kind of method and apparatus for realizing mobile terminal remote control, mobile terminal and system - Google Patents

A kind of method and apparatus for realizing mobile terminal remote control, mobile terminal and system Download PDF

Info

Publication number
CN106909861A
CN106909861A CN201510982126.8A CN201510982126A CN106909861A CN 106909861 A CN106909861 A CN 106909861A CN 201510982126 A CN201510982126 A CN 201510982126A CN 106909861 A CN106909861 A CN 106909861A
Authority
CN
China
Prior art keywords
mobile terminal
remote control
numbers
terminal
instruction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510982126.8A
Other languages
Chinese (zh)
Inventor
张炅轩
范国峰
张之弢
邱慧
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Qizhi Software Beijing Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201510982126.8A priority Critical patent/CN106909861A/en
Publication of CN106909861A publication Critical patent/CN106909861A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/88Detecting or preventing theft or loss

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

This application discloses a kind of method and apparatus for realizing mobile terminal remote control, mobile terminal and system.Methods described includes:Carrying IMEI information and the remote control open command of associated numbers that mobile terminal the reception server sends;Whether the mobile terminal verifies the IMEI information carried in the remote control open command consistent with the IMEI information of the mobile terminal;If consistent, the mobile terminal is verified in the trusted list of numbers of the mobile terminal with the presence or absence of the associated numbers;If in the presence of the mobile terminal starts remote control function and sends remote control to the corresponding associated terminal of the associated numbers opens successful notification message.The embodiment of the present application can be after mobile terminal be stolen, remote control function is opened to mobile terminal, obtain the positioning of mobile terminal, delete privacy picture in mobile terminal, the information such as account number cipher, information leakage is prevented, reduces user's property loss, increase the beneficial effect of the possibility that mobile terminal is given for change.

Description

A kind of method and apparatus for realizing mobile terminal remote control, mobile terminal and system
Technical field
The application is related to the Internet, applications field, more particularly to a kind of side for realizing mobile terminal remote control Method and device, mobile terminal and system.
Background technology
With the popularization of intelligent mobile terminal and developing rapidly for network, mobile terminal is played the part of in people live The role for drilling is also more and more important, in working and live as people indispensable comprehensive " assistant ". Use for convenience, people in the application using mobile terminal would generally voluntarily or be forced by various accounts believe The information leave-ons related to personal identification, property such as breath, private chat record and picture photo are mobile whole In end.If mobile terminal is lost, it is not only possible to can bring property loss, what is more important user to user Personal information being stored in mobile terminal etc. may be compromised, causes incalculable damage.Therefore, Control after mobile terminal is lost seems particularly significant with treatment.
In the prior art, such as mobile terminal, such as mobile phone, before being stolen, mobile terminal is not turned on remotely Control instruction, the owner of lost property cannot be controlled after hand-set from stolen to mobile phone, typically all can only by alarm come Solve, if can not now obtain the positioning of stolen mobile phone, the hope for finding mobile phone also can be especially remote.
To sum up, after mobile terminal is stolen in the prior art, the mobile terminal owner can not adopt an effective measure Prevent the information leakage on mobile terminal or give mobile terminal for change, therefore, need badly a kind of effective mobile whole The remote control technology at end.
The content of the invention
The embodiment of the present application provides a kind of reality for overcoming above mentioned problem or solving the above problems at least in part Method and apparatus, mobile terminal and system that existing mobile terminal remote is controlled.
The embodiment of the present application uses following technical proposals:
A kind of method for realizing mobile terminal remote control, including:
The carrying IMEI information and the remote control of associated numbers that mobile terminal the reception server sends are opened and referred to Order;
The mobile terminal verify the IMEI information that is carried in the remote control open command whether with the shifting The IMEI information of dynamic terminal is consistent;
If consistent, the mobile terminal is verified in the trusted list of numbers of the mobile terminal with the presence or absence of described Associated numbers;
If in the presence of the mobile terminal starts remote control function and associated eventually to the associated numbers are corresponding End sends remote control and opens successful notification message.
Further, the mobile terminal the reception server sends carrying IMEI information and associated numbers Remote control open command, including:
The mobile terminal carrying IMEI information and associated numbers that in stolen status, the reception server sends Remote control open command.
Further, start remote control function in mobile terminal and associated eventually to the associated numbers are corresponding After end sends the remote control successful notification message of unlatching, methods described also includes:
The mobile terminal receives the control instruction for coming from the corresponding associated terminal of the associated numbers, and presses Corresponding operating is performed according to the control instruction.
Further, the control instruction includes that the instruction of the position for obtaining mobile terminal, acquisition are stored in institute The instruction for stating data in mobile terminal and/or the instruction for deleting data in the mobile terminal.
A kind of device for realizing mobile terminal remote control, including:
Receiving unit, the carrying IMEI information and the remote control of associated numbers sent for the reception server Open command;
First verification unit, for whether verifying the IMEI information carried in the remote control open command IMEI information with the mobile terminal is consistent;
Second verification unit, for IMEI information and the shifting for being carried in the remote control open command When the IMEI information of dynamic terminal is inconsistent, whether there is in the trusted list of numbers for verifying the mobile terminal The associated numbers;
Remote control opening unit, for there is the association in the trusted list of numbers of the mobile terminal During number, start remote control function and send remote control to the corresponding associated terminal of the associated numbers and open Open successful notification message.
Further, the described device for realizing mobile terminal remote control, the receiving unit is used for:
The mobile terminal carrying IMEI information and associated numbers that in stolen status, the reception server sends Remote control open command.
Further, the described device for realizing mobile terminal remote control, the mobile terminal also includes:
The mobile terminal receives the control instruction for coming from the corresponding associated terminal of the associated numbers, and presses Corresponding operating is performed according to the control instruction.
Further, the described device for realizing mobile terminal remote control, the control instruction includes obtaining The instruction of the data that the instruction or acquisition of the position of mobile terminal are stored in the mobile terminal is deleted The instruction of the data in the mobile terminal.
A kind of mobile terminal, the mobile terminal includes the above-mentioned device for realizing mobile terminal remote control.
A kind of system for realizing mobile terminal remote control, including:
Mobile terminal, the mobile terminal includes the described device for realizing mobile terminal remote control;And
Server, the long-range control of carrying IMEI information and associated numbers for being sent to the mobile terminal Open command processed;
Associated terminal, opens successful notification message and the mobile terminal is carried out for receiving remote control Remote control.
Above-mentioned at least one technical scheme that the embodiment of the present application is used can reach following beneficial effect:
The embodiment of the present application is obtained by that to mobile terminal remote control, can obtain the position of mobile terminal Or the data being stored in the mobile terminal are deleted, or go mobile terminal to lock etc..In mobile terminal After stolen, can effectively suppress stealer and the mobile terminal is bought and sold, it is also possible to which protection is stolen The individual privacy and property safety of person.
Brief description of the drawings
Accompanying drawing described herein is used for providing further understanding of the present application, constitutes of the application Point, the schematic description and description of the application is used to explain the application, does not constitute to the application not Work as restriction.In the accompanying drawings:
Fig. 1 is the flow chart of the method for realizing mobile terminal remote control of offer in the embodiment of the application one;
Fig. 2 is the scene graph of the remote control for realizing mobile terminal of offer in the embodiment of the application one;
Fig. 3 is the module map of the device for realizing mobile terminal remote control of offer in the embodiment of the application one.
Specific embodiment
It is specifically real below in conjunction with the application to make the purpose, technical scheme and advantage of the application clearer Apply example and corresponding accompanying drawing is clearly and completely described to technical scheme.Obviously, it is described Embodiment is only some embodiments of the present application, rather than whole embodiments.Based on the implementation in the application Example, the every other implementation that those of ordinary skill in the art are obtained under the premise of creative work is not made Example, belongs to the scope of the application protection.
Below in conjunction with accompanying drawing, the technical scheme that each embodiment of the application is provided is described in detail.
Fig. 1 is the flow chart for realizing mobile terminal remote control method of offer in the embodiment of the application one, bag Include:
S101:Carrying IMEI information and the remote control of associated numbers that mobile terminal the reception server sends Open command.
In the embodiment of the present application, the mobile terminal may be stolen, in stolen status.In the step In refer to " IMEI information ", IMEI is International Mobile Equipment Identification The abbreviation of Number (international mobile equipment identification number), is used to distinguish different mobile terminals.IMEI information Storage in a mobile device, can be used to monitor stolen or invalid mobile device.IMEI can use mobile terminal Equipment checks in that (content of the mobile phone required input of different vendor is different, and same manufacturer is not by keying in " * #06# " Difference is likely to the content of mobile phone required input).Under normal circumstances, the overall length of IMEI is 15, every Numeral using only 0~9 numeral, consisting of:
1st, preceding 6 digit (TAC, Type Approval Code) is " Type Approval number ", general proxy Type.
2nd, then 2 digits (FAC, Final Assembly Code) are " finally assemblings number ", typically Represent the place of production.
3rd, afterwards 6 digits (SNR, Serial Number, sequence number of dispatching from the factory) are " string number ", general generation Table production sequence number.
4th, last 1 digit (SP) is typically " 0 ", is check code, standby.
IMEI code has uniqueness, is attached on the mark at the mobile phone back side, and read and write in mobile phone EMS memory. It is also " archives " and " identification card number " of the mobile phone in producer.
Such as:The IMEI of one GT-I9308 mobile phone of SAMSUNG is:355065 05 331100 1/01. Wherein, 355065 is TAC, and 05 is FAC, and 331100 is SNR, and 1 is SP, and 01 is software version Number.
IMEI is TAC+FAC+SNR+SP.IMEI, it is corresponded with every mobile phone, and should Code is the unique whole world.Each mobile phone will all be endowed one globally unique one group after finishing assembly Number, this number will all be recorded from producing to being delivered for use by manufacturer.It can be seen that, the IMEI of mobile phone, Just as citizen ID certificate number, the authority's mark as identification mobile phone ownership and property.
If the mobile phone of user is not turned on remote control function before losing, after user mobile phone loss, User can be by providing purchase machine invoice, the nearest message registration list of mobile phone, part mobile phone contact row at that time Table etc. can indicate user for this mobile phone and the proprietary evidence of number, it is desirable to which server issues a long-range control In the remote control open command that open command processed is issued to the stolen mobile phone, the server, take Band IMEI information and associated numbers.Certainly, in actual application, taken by artificial triggering except this Business device is issued outside the mode of remote control open command, can also by other electronic equipments (such as, other Mobile terminal) sent to server and asked, indicate server to issue remote control open command to stolen mobile phone.
S102:Whether the IMEI information carried in the mobile terminal verification remote control open command IMEI information with the mobile terminal is consistent;If consistent, step S103 is performed.
The mobile terminal carrying IMEI information and associated numbers that in stolen status, the reception server sends Remote control open command.The mobile terminal is after stolen, no matter whether stealer carries out data deletion, Brush machine, changes the measures such as SIM, described mobile whole as long as the mobile terminal is in start communications status End can the reception server send carrying IMEI information and associated numbers remote control open command.
The mobile terminal in receiving the remote control open command carry IMEI information after, with institute The corresponding IMEI information contrast of terminal itself is stated, is confirmed whether consistent:If both are inconsistent, can not Remote control function is opened, the notification to server passback " inconsistent " at this moment can be selected.Certainly, In actual application, the IMEI information for sending over is stored with the mobile terminal itself for receiving the information IMEI it is inconsistent the reason for may be a lot, such as, IMEI information is provided in mistake, transmitting procedure by more Change, mobile terminal device has been damaged;If both are consistent, step S103 is performed.
For example, the IMEI number included in the remote control open command that is sent to stolen mobile phone of server is 355065 05 331,100 1/01, stolen mobile phone after information is received, by the IMEI number and the IMEI of itself Numbers 355,056 04 331,100 1/01 contrasts, find inconsistent, then open remote control function failure.
If the IMEI number included in the remote control open command that server sends to stolen mobile phone is 355056 04 331,100 1/01, stolen mobile phone after information is received, by the IMEI number and the IMEI number 355056 of itself 04 331,100 1/01 contrasts are consistent, then carry out next step.
S103:The mobile terminal is verified in the trusted list of numbers of the mobile terminal with the presence or absence of the pass Chain store code;If in the presence of, carry out step 104.
The mobile terminal verify the IMEI information that is carried in the remote control open command whether with the shifting The IMEI information of dynamic terminal is unanimously verified in the trusted list of numbers of the mobile terminal with the presence or absence of described afterwards Associated numbers;If in the presence of, carry out step 104.
For example, the associated numbers included in the antitheft open command that is sent to stolen mobile phone of server are 13333333333, stolen mobile phone verifies the associated numbers 13333333333 after verification IMEI is correct Not in the stolen mobile phone trusted list of numbers, remote control function failure is opened;If being present in credible Appoint in list of numbers, the stolen mobile phone can carry out next step.
S104:The mobile terminal starts remote control function and to the corresponding associated terminal of the associated numbers Send remote control and open successful notification message.
After there are the associated numbers in the trusted list of numbers that step S103 verifies the mobile terminal, The mobile terminal starts remote control function, and described startup is successfully notified into transmission to associated numbers pair The association answered is interrupted.
In discussed above, it has been in the case of stolen status mainly for mobile terminal, how has opened long-range Control.In fact, in the non-stolen status of mobile terminal, it is long-range that user can also preferentially set associated numbers Control instruction, then, if certain when the mobile terminal be stolen, without providing the purchase card such as invoice It is bright, directly remote control can be carried out by the mobile terminal being stolen described in associated numbers terminal-pair.
After contacting between the terminal of associated numbers and stolen mobile terminal is established, just can be by association number The corresponding associated terminal of code is controlled to stolen mobile terminal, thus, S104 the step of above-described embodiment Afterwards, the application can also include:
S105:Mobile terminal receives the control instruction for coming from the corresponding associated terminal of the associated numbers, and Corresponding operating is performed according to the control instruction..
After the mobile terminal opens remote control function, to the corresponding associated terminal of the associated numbers Send and open successful message.Afterwards, the corresponding associated terminal of the associated numbers can control the movement Terminal, control instruction is sent to the mobile terminal.The mobile terminal receive the control instruction with After perform corresponding operating.
Here control instruction can be presented as various instructions, scope, form, form of instruction etc. Can arrange in advance.Such as, control instruction can be the instruction of the position for obtaining mobile terminal or obtain The instruction for taking the data being stored in the mobile terminal or the finger for deleting data in the mobile terminal Order.
For example, mobile terminal (i.e. stolen mobile phone) is after verification IMEI and associated numbers, open long-range Control function, the corresponding associated terminal of associated numbers can send control instruction requirement stolen mobile phone and delete mobile phone The photo of middle storage, stolen mobile phone performs the instruction of deletion photo and feeds back after the control instruction is received To associated terminal.
The embodiment of the present application, can open remote control function after mobile terminal is stolen to mobile terminal, The positioning of mobile terminal is obtained, the information such as privacy picture in mobile terminal, account number cipher are deleted, information is prevented Leakage, reduces user's property loss, increases the possibility that mobile terminal is given for change.
Fig. 2 is the scene graph of the remote control for realizing mobile terminal of offer in the embodiment of the application one, including:
User 201 after mobile terminal 210 is stolen, user 201 can by providing purchase machine invoice at that time, It is this mobile phone and number institute that the nearest message registration list of mobile phone, part mobile phone contact list etc. can indicate user The evidence of someone, it is desirable to which server 200 issues a remote control open command to the mobile terminal 210.
In the remote control open command that the server 200 is issued, IMEI information and pass are carried Chain store code.
The mobile terminal 210 verify the IMEI information that carries in the remote control open command whether with The IMEI information of the mobile terminal 210 is consistent;If consistent, the mobile terminal 210 verifies the movement end Whether there is the associated numbers in the trusted list of numbers at end;If in the presence of the mobile terminal 210 is opened Dynamic remote control function simultaneously sends remote control unlatching successfully to the corresponding associated terminal of the associated numbers Notification message.
The corresponding associated terminal 220 of associated numbers successfully opens the remote control in the mobile terminal 210 After instruction, associated terminal 220 can send control instruction to the mobile terminal 210, for example, can be with Be the position for obtaining mobile terminal instruction or acquisition be stored in data in the mobile terminal instruction, Or the instruction of the data in the deletion mobile terminal.
Mobile terminal 210 performs corresponding operating after the control instruction is received according to the control instruction.
For example, the associated terminal 220 sends to mobile terminal 210 obtains the position of mobile terminal 210 Instruction, the mobile terminal 210 after the control instruction is received, obtain self-position and send to pass Connection terminal 220.
Fig. 3 is the installation drawing for realizing mobile terminal remote control unlatching of offer in the embodiment of the application one.Base In the content of the above method, this realizes the device that mobile terminal remote control is opened, including:
Receiving unit 301, for the reception server send carrying IMEI information and associated numbers it is long-range Control open command.
The receiving unit 301 can in stolen status the reception server send carrying IMEI information and The remote control open command of associated numbers.
First verification unit 302, for verifying the IMEI information carried in the remote control open command It is whether consistent with the IMEI information of the mobile terminal;
Second verification unit 303, in the remote control open command carry IMEI information with When the IMEI information of the mobile terminal is inconsistent, verify in the trusted list of numbers of the mobile terminal whether There are the associated numbers;
Remote control unit 304, for there is the association in the trusted list of numbers of the mobile terminal During number, start remote control function and successfully notify to disappear to associated numbers transmission remote control unlatching Breath.
After control function is opened by foregoing device, just foregoing mobile terminal can as desired be carried out Control.So, it is described to realize the device that remote control is opened, can also include:
Execute instruction unit is received, the control of the corresponding associated terminal of the associated numbers is come from for receiving Instruction, and perform corresponding operating according to the control instruction.
It is described mobile whole that the control instruction includes that the instruction of the position for obtaining mobile terminal or acquisition are stored in The instruction of the data in the instruction of the data in end or the deletion mobile terminal.
The embodiment of the present application also discloses a kind of system for realizing mobile terminal remote control.Reference picture 2, figure 3, the system includes:
The mobile terminal 210 of the above-mentioned device for realizing mobile terminal remote control and server 200, association are eventually End 220.
The mobile terminal 210, including:
Receiving unit 301, for the reception server send carrying IMEI information and associated numbers it is long-range Control open command.
First verification unit 302, for verifying the IMEI information carried in the remote control open command It is whether consistent with the IMEI information of the mobile terminal;
Second verification unit 303, in the remote control open command carry IMEI information with When the IMEI information of the mobile terminal is inconsistent, verify in the trusted list of numbers of the mobile terminal whether There are the associated numbers;
Remote control unit 304, for there is the association in the trusted list of numbers of the mobile terminal During number, start remote control function and successfully notify to disappear to associated numbers transmission remote control unlatching Breath.
The server, for the remote of the carrying IMEI information that is sent to the mobile terminal and associated numbers Process control open command;
The associated terminal, successful notification message is opened and to the mobile terminal for receiving remote control Carry out remote control.
The embodiment of the present application, can open remote control function after mobile terminal is stolen to mobile terminal, The positioning of mobile terminal is obtained, the information such as privacy picture in mobile terminal, account number cipher are deleted, information is prevented Leakage, reduces the loss of user's property loss, increases the possibility that mobile terminal is given for change.
It should be understood by those skilled in the art that, embodiments herein can be provided as method, system or meter Calculation machine program product.Therefore, the application can be using complete hardware embodiment, complete software embodiment or knot Close the form of the embodiment in terms of software and hardware.And, the application can be used and wherein wrapped at one or more Containing computer usable program code computer-usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) on implement computer program product form.
The application is produced with reference to the method according to the embodiment of the present application, equipment (system) and computer program The flow chart and/or block diagram of product is described.It should be understood that can by computer program instructions realize flow chart and / or block diagram in each flow and/or the flow in square frame and flow chart and/or block diagram and/ Or the combination of square frame.These computer program instructions to all-purpose computer, special-purpose computer, insertion can be provided The processor of formula processor or other programmable data processing devices is producing a machine so that by calculating The instruction of the computing device of machine or other programmable data processing devices is produced for realizing in flow chart one The device of the function of being specified in individual flow or multiple one square frame of flow and/or block diagram or multiple square frames.
These computer program instructions may be alternatively stored in can guide computer or the treatment of other programmable datas to set In the standby computer-readable memory for working in a specific way so that storage is in the computer-readable memory Instruction produce include the manufacture of command device, the command device realization in one flow of flow chart or multiple The function of being specified in one square frame of flow and/or block diagram or multiple square frames.
These computer program instructions can be also loaded into computer or other programmable data processing devices, made Obtain and series of operation steps is performed on computer or other programmable devices to produce computer implemented place Reason, so as to the instruction performed on computer or other programmable devices is provided for realizing in flow chart one The step of function of being specified in flow or multiple one square frame of flow and/or block diagram or multiple square frames.
In a typical configuration, computing device includes one or more processors (CPU), input/defeated Outgoing interface, network interface and internal memory.
Internal memory potentially includes the volatile memory in computer-readable medium, random access memory And/or the form, such as read-only storage (ROM) or flash memory (flash RAM) such as Nonvolatile memory (RAM). Internal memory is the example of computer-readable medium.
Computer-readable medium includes that permanent and non-permanent, removable and non-removable media can be by appointing What method or technique realizes information Store.Information can be computer-readable instruction, data structure, program Module or other data.The example of the storage medium of computer includes, but are not limited to phase transition internal memory (PRAM), static RAM (SRAM), dynamic random access memory (DRAM), its The random access memory (RAM) of his type, read-only storage (ROM), electrically erasable are read-only Memory (EEPROM), fast flash memory bank or other memory techniques, read-only optical disc read-only storage (CD-ROM), digital versatile disc (DVD) or other optical storages, magnetic cassette tape, tape magnetic Disk storage or other magnetic storage apparatus or any other non-transmission medium, can be used for storage can be calculated The information that equipment is accessed.Defined according to herein, computer-readable medium does not include temporary computer-readable matchmaker Body (transitory media), such as data-signal and carrier wave of modulation.
Also, it should be noted that term " including ", "comprising" or its any other variant be intended to non-row His property is included, so that process, method, commodity or equipment including a series of key elements not only include Those key elements, but also other key elements including being not expressly set out, or also include for this process, Method, commodity or the intrinsic key element of equipment.In the absence of more restrictions, by sentence " including One ... " key element that limits, it is not excluded that in the process including the key element, method, commodity or set Also there is other identical element in standby.
It will be understood by those skilled in the art that embodiments herein can be provided as method, system or computer journey Sequence product.Therefore, the application can using complete hardware embodiment, complete software embodiment or combine software and The form of the embodiment of hardware aspect.And, the application can be used and wherein include calculating at one or more Machine usable program code computer-usable storage medium (including but not limited to magnetic disk storage, CD-ROM, Optical memory etc.) on implement computer program product form.
Embodiments herein is the foregoing is only, the application is not limited to.For this area skill For art personnel, the application can have various modifications and variations.All institutes within spirit herein and principle Any modification, equivalent substitution and improvements of work etc., within the scope of should be included in claims hereof.

Claims (10)

1. it is a kind of to realize the method that mobile terminal remote is controlled, it is characterised in that including:
The carrying IMEI information and the remote control of associated numbers that mobile terminal the reception server sends are opened and referred to Order;
The mobile terminal verify the IMEI information that is carried in the remote control open command whether with the shifting The IMEI information of dynamic terminal is consistent;
If consistent, the mobile terminal is verified in the trusted list of numbers of the mobile terminal with the presence or absence of described Associated numbers;
If in the presence of the mobile terminal starts remote control function and associated eventually to the associated numbers are corresponding End sends remote control and opens successful notification message.
2. the method for claim 1, it is characterised in that the mobile terminal the reception server hair The carrying IMEI information and the remote control open command of associated numbers sent, including:
The mobile terminal carrying IMEI information and associated numbers that in stolen status, the reception server sends Remote control open command.
3. the method for claim 1, it is characterised in that start remote control work(in mobile terminal After and the remote control successful notification message of unlatching can be sent to the corresponding associated terminal of the associated numbers, institute Stating method also includes:
The mobile terminal receives the control instruction for coming from the corresponding associated terminal of the associated numbers, and presses Corresponding operating is performed according to the control instruction.
4. method as claimed in claim 3, it is characterised in that the control instruction includes obtaining and moves The instruction of the position of terminal, acquisition are stored in the instruction and/or the deletion shifting of the data in the mobile terminal The instruction of the data in dynamic terminal.
5. it is a kind of to realize the device that mobile terminal remote is controlled, it is characterised in that including:
Receiving unit, the carrying IMEI information and the remote control of associated numbers sent for the reception server Open command;
First verification unit, for whether verifying the IMEI information carried in the remote control open command IMEI information with the mobile terminal is consistent;
Second verification unit, for IMEI information and the shifting for being carried in the remote control open command When the IMEI information of dynamic terminal is inconsistent, whether there is in the trusted list of numbers for verifying the mobile terminal The associated numbers;
Remote control opening unit, for there is the association in the trusted list of numbers of the mobile terminal During number, start remote control function and send remote control to the corresponding associated terminal of the associated numbers and open Open successful notification message.
6. it is as claimed in claim 5 to realize the device that mobile terminal remote is controlled, it is characterised in that institute Stating receiving unit is used for:
The mobile terminal carrying IMEI information and associated numbers that in stolen status, the reception server sends Remote control open command.
7. it is as claimed in claim 5 to realize the device that mobile terminal remote is controlled, it is characterised in that institute Stating mobile terminal also includes:
The mobile terminal receives the control instruction for coming from the corresponding associated terminal of the associated numbers, and presses Corresponding operating is performed according to the control instruction.
8. it is as claimed in claim 7 to realize the device that mobile terminal remote is controlled, it is characterised in that institute Stating control instruction includes that the instruction of the position for obtaining mobile terminal or acquisition are stored in the mobile terminal The instruction of the data in the instruction of data or the deletion mobile terminal.
9. a kind of mobile terminal, it is characterised in that the mobile terminal includes appointing in claim 5 to 8 The device for realizing mobile terminal remote control described in what one.
10. it is a kind of to realize the system that mobile terminal remote is controlled, it is characterised in that including:
Mobile terminal, the mobile terminal includes the realization movement any one of claim 5 to 8 The device of terminal remote control;And
Server, the long-range control of carrying IMEI information and associated numbers for being sent to the mobile terminal Open command processed;
Associated terminal, opens successful notification message and the mobile terminal is carried out for receiving remote control Remote control.
CN201510982126.8A 2015-12-23 2015-12-23 A kind of method and apparatus for realizing mobile terminal remote control, mobile terminal and system Pending CN106909861A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510982126.8A CN106909861A (en) 2015-12-23 2015-12-23 A kind of method and apparatus for realizing mobile terminal remote control, mobile terminal and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510982126.8A CN106909861A (en) 2015-12-23 2015-12-23 A kind of method and apparatus for realizing mobile terminal remote control, mobile terminal and system

Publications (1)

Publication Number Publication Date
CN106909861A true CN106909861A (en) 2017-06-30

Family

ID=59206250

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510982126.8A Pending CN106909861A (en) 2015-12-23 2015-12-23 A kind of method and apparatus for realizing mobile terminal remote control, mobile terminal and system

Country Status (1)

Country Link
CN (1) CN106909861A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107517278A (en) * 2017-10-11 2017-12-26 上海展扬通信技术有限公司 The long-range control method and tele-control system of a kind of intelligent terminal
CN109639834A (en) * 2019-01-25 2019-04-16 努比亚技术有限公司 A kind of synchronizing information processing method, system and mobile terminal
CN110674537A (en) * 2019-09-23 2020-01-10 深圳供电局有限公司 Method, mobile terminal and system for remotely erasing application terminal data
CN114079690A (en) * 2020-08-13 2022-02-22 超聚变数字技术有限公司 Terminal function control method, device, terminal and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103702299A (en) * 2013-12-13 2014-04-02 北京奇虎科技有限公司 Mobile terminal antitheft method and client
CN103702331A (en) * 2013-12-13 2014-04-02 北京奇虎科技有限公司 Mobile terminal antitheft method and client
CN103702318A (en) * 2013-12-13 2014-04-02 北京奇虎科技有限公司 Mobile terminal antitheft method and client

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103702299A (en) * 2013-12-13 2014-04-02 北京奇虎科技有限公司 Mobile terminal antitheft method and client
CN103702331A (en) * 2013-12-13 2014-04-02 北京奇虎科技有限公司 Mobile terminal antitheft method and client
CN103702318A (en) * 2013-12-13 2014-04-02 北京奇虎科技有限公司 Mobile terminal antitheft method and client

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107517278A (en) * 2017-10-11 2017-12-26 上海展扬通信技术有限公司 The long-range control method and tele-control system of a kind of intelligent terminal
CN109639834A (en) * 2019-01-25 2019-04-16 努比亚技术有限公司 A kind of synchronizing information processing method, system and mobile terminal
CN110674537A (en) * 2019-09-23 2020-01-10 深圳供电局有限公司 Method, mobile terminal and system for remotely erasing application terminal data
CN114079690A (en) * 2020-08-13 2022-02-22 超聚变数字技术有限公司 Terminal function control method, device, terminal and storage medium

Similar Documents

Publication Publication Date Title
CN106304074B (en) Auth method and system towards mobile subscriber
CN104852925B (en) Mobile intelligent terminal anti-data-leakage secure storage, backup method
CN109471844A (en) File sharing method, device, computer equipment and storage medium
CN103795798B (en) Mobile phone checking-in method
CN104137587B (en) A kind of method and terminal device for sending, receiving user data
CN106899410A (en) A kind of method and device of equipment identities certification
CN106850209A (en) A kind of identity identifying method and device
CN106603484A (en) Virtual key method and apparatus using the same, background system, and user terminal
EP2232905B1 (en) A method for loading credentials into a mobile communication device such as a mobile phone
CN104601324A (en) Verification method specific to applications, terminal and system
CN106909861A (en) A kind of method and apparatus for realizing mobile terminal remote control, mobile terminal and system
CN106961334A (en) Secure wireless communication between controller and annex
CN105975867B (en) A kind of data processing method
CN103581441A (en) Mobile terminal tracking anti-theft system and method
CN108307333A (en) Intermediary number sending method, device and storage medium for mobile communication equipment
CN107341406A (en) A kind of method and terminal for protecting privacy of user data
CN104318286A (en) NFC label data management method and system and terminal
JP2012065123A (en) Ic card system, communication terminal therefor and portable terminal therefor
CN109002875A (en) Two dimensional code encryption method, two dimensional code Transmission system and storage medium
CN101815292A (en) Device and method for protecting data of mobile terminal
CN106911653A (en) A kind of method for realizing mobile terminal remote control, device, mobile terminal and system
CN106559386A (en) A kind of authentication method and device
CN109302442A (en) A kind of data storage method of proof and relevant device
CN103107881B (en) Access method, device and system of smart card
CN106230832B (en) A kind of method of device identification calibration

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170630

RJ01 Rejection of invention patent application after publication