Disclosure of Invention
In order to overcome the defects of the prior art, the invention provides a method for remotely locking and unlocking an MIFI terminal.
The technical scheme of the invention is as follows:
a method for remotely locking and unlocking an MIFI terminal comprises the following steps:
1) and (3) binding user information: the user registers in the terminal software, the user borrows the MIFI terminal through the terminal software, and the remote computer system binds the user registration information with the MIFI terminal information;
2) and (4) locking judgment: carrying out locking judgment according to the fact that a remote computer system monitors that the MIFI terminal is illegally used or a user proposes a locking application, if the judgment is yes, carrying out the next step, and if the judgment is no, normally using the MIFI terminal;
3) and sending a locking instruction: the remote computer system sends a locking instruction to the MIFI terminal;
4) locking prompt information: the remote computer system sends locking prompt information to the terminal software to remind a user that the MIFI terminal is in a locked state, and if unlocking is needed, unlocking application is needed according to the locking prompt information;
5) applying for unlocking: the user carries out unlocking application according to the locking prompt information in the step 4) to finish the confirmation and the check of the user information and the locking prompt information,
6) and (4) unlocking judgment: the system checks according to the user information and the locking prompt information provided by the user in the step 5), if the unlocking information is not accordant, the locking state is continuously kept, the step 5) is returned, if the unlocking information is accordant, the next step is carried out,
7) and sending an unlocking instruction: the remote computer system sends an unlocking instruction to the MIFI terminal;
8) and (4) unlocking information prompt: the remote computer system sends unlocking prompt information to the terminal software to remind a user that the MIFI terminal meets the unlocking condition, and the next step is carried out;
9) and completing the unlocking of the MIFI terminal.
Further, the illegal use of the MIFI terminal in the locking judgment of step 2) includes: out of a defined flow range, out of a defined place of use, out of a defined time of use, and logging in to an illegal website.
Further, the step 3) of sending a lock instruction to the MIFI terminal by the remote computer system includes:
and the remote computer system sends a locking instruction to the MIFI terminal and confirms whether the MIFI terminal is locked, if so, the MIFI terminal is locked and the next step is carried out, and if not, the previous step is returned.
Further, the step 7) of sending an unlocking instruction to the MIFI terminal by the remote computer system includes:
and sending an unlocking instruction to the MIFI terminal, confirming whether the MIFI terminal is unlocked, if so, carrying out the next step, and if not, returning to the previous step.
Further, the prompt information is locked in the step 4): the remote computer system sends locking prompt information to the terminal software to remind a user that the MIFI terminal is in a locked state, if unlocking is needed, the user returns the MIFI terminal, and the MIFI terminal is unlocked.
Further, the MIFI terminal, the remote computer system, and the terminal software are connected via a wireless communication network.
According to the technical scheme, the MIFI terminal can be remotely controlled, and can respond in time when being used maliciously, such as exceeding a flow range, exceeding the use time, accessing an illegal website and the like, when the MIFI terminal is lost or stolen, further loss can be avoided by locking the MIFI terminal, and meanwhile, a user can not be identified and used when replacing an SIM card; the invention has an active control function, can set various locking rules, is used for monitoring and locking MIFI terminals in batches, and prevents malicious use of users.
Detailed Description
The invention is further described with reference to the following figures and embodiments:
as shown in fig. 1-2, a method for remotely locking and unlocking an MIFI terminal includes the following steps:
1) and (3) binding user information: the user registers in the terminal software, the user borrows the MIFI terminal through the terminal software, and the remote computer system binds the user registration information with the MIFI terminal information.
2) And (4) locking judgment: and carrying out locking judgment according to the fact that the remote computer system monitors the MIFI terminal to be illegally used or a user proposes a locking application, if the judgment is yes, carrying out the next step, and if the judgment is no, normally using the MIFI terminal.
Wherein, the illegal use of the MIFI terminal comprises exceeding a limited flow range, exceeding a limited use place, exceeding a limited use time and logging in an illegal website,
or after the user finds that the MIFI terminal is lost or stolen, the user sends a locking application on the terminal software, and then locking judgment is carried out.
3) And sending a locking instruction: the remote computer system issues a lock instruction to the MIFI terminal.
Wherein, the remote computer system sends a locking instruction to the MIFI terminal, and the method comprises the following steps:
and the remote computer system sends a locking instruction to the MIFI terminal and confirms whether the MIFI terminal is locked, if so, the MIFI terminal is locked and the next step is carried out, and if not, the previous step is returned.
4) Locking prompt information: the remote computer system sends locking prompt information to the terminal software to remind a user that the MIFI terminal is in a locked state, and if unlocking is needed, unlocking application is needed according to the locking prompt information; or the user returns the MIFI terminal, and the MIFI terminal is unlocked.
5) Applying for unlocking: the user carries out unlocking application according to the locking prompt information in the step 4), and the confirmation and the check of the user information and the locking prompt information are completed.
6) And (4) unlocking judgment: the system checks according to the user information and the locking prompt information provided by the user in the step 5), if the unlocking information is not in accordance, the locking state is continuously kept, the step 5) is returned, and if the unlocking information is in accordance, the next step is carried out.
7) And sending an unlocking instruction: and the remote computer system sends an unlocking instruction to the MIFI terminal.
The remote computer system sends an unlocking instruction to the MIFI terminal, and the unlocking instruction comprises the following steps:
and sending an unlocking instruction to the MIFI terminal, confirming whether the MIFI terminal is unlocked, if so, carrying out the next step, and if not, returning to the previous step.
8) And (4) unlocking information prompt: and the remote computer system sends unlocking prompt information to the terminal software to remind the user that the MIFI terminal meets the unlocking condition, and the next step is carried out.
9) And completing the unlocking of the MIFI terminal.
The remote control locking mechanism of the MIFI terminal is as follows: the MIFI terminal, the remote computer system and the terminal software are connected through a wireless communication network, and the wireless communication network is preferably a 4G wireless communication network or a 3G wireless communication network;
the MIFI terminal has the SIM binding function, namely the SIM card which is not in line with the input of a remote computer system can not be identified and used. When the MIFI terminal needs to be controlled, the remote computer system sends a locking instruction through the wireless communication network, and after the MIFI terminal receives the locking instruction, the instruction is responded, and the corresponding function of the MIFI is closed, so that locking is realized; meanwhile, a prompt is sent to the terminal software to remind the user of the reason of being locked and inform the user of the required process of unlocking. The remote computer system can set locking and unlocking rules in various states, so that the locking and unlocking can be conveniently carried out in batch, and manual intervention is reduced.
The remote computer system in the invention can lock the MIFI terminal for the following reasons: when the user reports that the MIFI is lost or stolen, the user uses the MIFI beyond a limited time length or flow range, the user logs in an illegal website or other illegal purposes, the remote computer system automatically and intelligently monitors and correspondingly sends out a locking instruction, and the MIFI terminal responds to the locking instruction and closes a corresponding function.
After the MIFI is locked, the remote computer system pushes information to the terminal software to remind the user that the MIFI terminal is locked. If the MIFI terminal is lost or stolen, the user applies for locking, and the position of the MIFI terminal is considered to be tracked, and a recovery scheme is implemented; if the service time or the flow exceeds the standard, the remote computer system actively locks according to the actual monitoring rule and informs the user of the required flow for unlocking, so that the user can conveniently carry out unlocking action; or the user returns the MIFI terminal, and the MIFI terminal is unlocked.
The invention can remotely control the MIFI terminal, can respond in time when being used maliciously, such as exceeding the flow range, exceeding the use duration, visiting illegal websites and the like, can avoid further loss by locking the MIFI terminal under the condition that the MIFI terminal is lost or stolen, and meanwhile, a user can not be identified and used when replacing the SIM card; the invention has an active control function, can set various locking rules, is used for monitoring and locking MIFI terminals in batches, and prevents malicious use of users.
It will be understood that modifications and variations can be made by persons skilled in the art in light of the above teachings and all such modifications and variations are intended to be included within the scope of the invention as defined in the appended claims.
The invention is described above with reference to the accompanying drawings, which are illustrative, and it is obvious that the implementation of the invention is not limited in the above manner, and it is within the scope of the invention to adopt various modifications of the inventive method concept and technical solution, or to apply the inventive concept and technical solution to other fields without modification.