WO2014082396A1 - Method and mobile terminal for locking mobile terminal - Google Patents

Method and mobile terminal for locking mobile terminal Download PDF

Info

Publication number
WO2014082396A1
WO2014082396A1 PCT/CN2013/072281 CN2013072281W WO2014082396A1 WO 2014082396 A1 WO2014082396 A1 WO 2014082396A1 CN 2013072281 W CN2013072281 W CN 2013072281W WO 2014082396 A1 WO2014082396 A1 WO 2014082396A1
Authority
WO
WIPO (PCT)
Prior art keywords
mobile terminal
information
unit
communication network
locking
Prior art date
Application number
PCT/CN2013/072281
Other languages
French (fr)
Chinese (zh)
Inventor
贾凌
Original Assignee
北京网秦天下科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京网秦天下科技有限公司 filed Critical 北京网秦天下科技有限公司
Publication of WO2014082396A1 publication Critical patent/WO2014082396A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • H04M1/67Preventing unauthorised calls from a telephone set by electronic means
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • H04W12/082Access security using revocation of authorisation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling

Definitions

  • the present invention relates to the field of mobile communications, and more particularly to a mobile terminal locking method
  • the existing mobile terminal anti-theft method mainly prevents the mobile terminal from being lost or stolen by setting a password in a mobile terminal (such as a mobile phone, a tablet computer, a portable computer, etc.).
  • a mobile terminal such as a mobile phone, a tablet computer, a portable computer, etc.
  • the password is entered incorrectly a predetermined number of times (for example, it can be set by the user), the data in the mobile terminal will be completely deleted. Although this guarantees the security of the data, it is not conducive to the recovery of the mobile terminal.
  • the present invention provides a mobile terminal locking method and a mobile terminal for implementing the above mobile terminal locking method.
  • the user can actively issue a lock command to the lost mobile terminal to improve the possibility that the mobile terminal is retrieved.
  • a mobile terminal locking method including: receiving and parsing a lock instruction information, obtaining a lock instruction, a user name and password information; and using a user name and password information locally stored by the mobile terminal , verify the obtained user name and password information; after successful verification, execute the lock instruction to lock the mobile terminal.
  • the lock instruction information may be received by listening to a Short Message Service (SMS) message received by the mobile terminal, or may be received from a server through a communication network.
  • SMS Short Message Service
  • the mobile terminal locking method may further include: after the mobile terminal is locked, the voice broadcast function is turned on, and the contact information of the user of the mobile terminal is broadcasted, and the contact information includes at least one of the following information: , email address, work address, residential address.
  • the mobile terminal locking method may further include: after the mobile terminal is locked, the positioning function is turned on, the mobile terminal is positioned; and the communication network is The location information of the mobile terminal is sent to the server.
  • the mobile terminal locking method may further include: backing up data in the mobile terminal to the server through the communication network after a predetermined time after locking the mobile terminal, and then performing a data erasing instruction, erasing the mobile All data in the terminal.
  • the communication network includes at least one of the following networks: the Internet, a mobile communication network.
  • a mobile terminal including: a transceiver unit, configured to receive lock instruction information; a parsing unit, configured to parse the received lock instruction information, obtain a lock instruction, a username, and The password information; the verification unit is configured to verify the obtained user name and password information by using the user name and password information stored locally by the mobile terminal; and the locking unit is configured to execute the lock instruction and lock the mobile terminal after the verification succeeds.
  • the transceiver unit may receive the lock instruction information by monitoring a short message (SMS) service message received by the mobile terminal, or may receive the lock instruction information from a server through a communication network.
  • SMS short message
  • the mobile terminal may further include: a voice broadcast unit, configured to: after the locking unit locks the mobile terminal, enable a voice broadcast function, and broadcast the contact information of the user of the mobile terminal, where the contact information includes the following: At least one of the messages: phone, email address, work address, home address.
  • a voice broadcast unit configured to: after the locking unit locks the mobile terminal, enable a voice broadcast function, and broadcast the contact information of the user of the mobile terminal, where the contact information includes the following: At least one of the messages: phone, email address, work address, home address.
  • the mobile terminal may further include: a positioning unit, configured to: after the locking unit locks the mobile terminal, enable a positioning function, locate the mobile terminal, and pass the transceiver unit, via the communication network, Send the location information of the mobile terminal to the server.
  • a positioning unit configured to: after the locking unit locks the mobile terminal, enable a positioning function, locate the mobile terminal, and pass the transceiver unit, via the communication network, Send the location information of the mobile terminal to the server.
  • the mobile terminal may further include: a data erasing unit, configured to: after the locking unit locks the mobile terminal, pass the predetermined time, through the transceiver unit, to data in the mobile terminal via the communication network After backing up to the server, a data erase command is executed to erase all data in the mobile terminal.
  • a data erasing unit configured to: after the locking unit locks the mobile terminal, pass the predetermined time, through the transceiver unit, to data in the mobile terminal via the communication network After backing up to the server, a data erase command is executed to erase all data in the mobile terminal.
  • the communication network includes at least one of the following networks: the Internet, a mobile communication network.
  • the user can actively issue a lock command to the lost mobile terminal, thereby improving the possibility that the mobile terminal is retrieved.
  • the mobile terminal can repeatedly broadcast the user's other contact information (telephone, email address, communication address, etc.), it is convenient to pick up the mobile terminal.
  • the person actively contacts the user to retrieve the mobile terminal.
  • the mobile terminal can actively upload the location of the mobile terminal, it is also advantageous for the user to retrieve the mobile terminal. Finally, due to the security of the content.
  • Fig. 1 is a schematic diagram showing an application scenario of a mobile communication system 1000 according to the present invention.
  • FIG. 2 is a flow chart showing a mobile terminal locking method 100 in accordance with an embodiment of the present invention.
  • FIG. 3 is a block diagram showing a mobile terminal 200 in accordance with an embodiment of the present invention.
  • the present invention will be described in detail by taking the scenario in which the present invention is applied to a wireless mobile communication system as an example.
  • the present invention is not limited thereto, and the present invention is also applicable to a fixed communication system, a wired communication system, or an arbitrary hybrid structure applied to a wireless mobile communication system, a fixed communication system, a wired communication system, or the like.
  • FIG. 1 is a schematic diagram showing an application scenario of a mobile communication system 1000 according to the present invention. As shown in FIG.
  • the mobile communication system 1000 can include mobile terminals 200 and 210, a server 300, and a computer 500.
  • mobile terminals 200 and 210 For the sake of clarity, only two mobile terminals 200 and 210 are shown in the figure, but the present invention is not limited thereto, and may include only one mobile terminal 200, and may also include three or more mobile terminals.
  • the mobile terminal 200 and the computer 500 may belong to the user A or may be operated by the user A.
  • the mobile terminal 210 may belong to the user A or may belong to another user, the user B.
  • Mobile terminal 200 and computer 500 can be coupled to server 300 via communication network 400.
  • Examples of communication network 400 may include, but are not limited to: the Internet, a mobile communication network.
  • the mobile terminal 200 and the mobile terminal 210 may be connected via a wireless communication network to perform various communications (eg, Short Message Service (SMS) communication, Multimedia Messaging Service (Solid S) communication, voice communication, video communication, etc.).
  • SMS Short Message Service
  • Solid S Multimedia Mess
  • the mobile terminal 200 includes a mobile terminal locking client 290 installed therein.
  • the mobile terminal locking client 290 may be installed in the mobile terminal 200 by the user A in the form of software, or may be installed in the mobile terminal 200 in the form of hardware or firmware by the mobile terminal manufacturer.
  • the user A Before enabling the mobile terminal to lock the client 290, the user A needs to complete the registration process to the server 300.
  • the user A can complete the registration process to the server 300 in the form of a webpage through the browser in the computer 500 or the mobile terminal 200.
  • the registration process to the server 300 can also be completed directly by the mobile terminal locking client 290 (for example, when the mobile terminal is started for the first time)
  • the terminal locks the client 290 the user A is prompted to complete).
  • User A registers the user identification (user name) and password information with the server 300; of course, the user name and password information of the user A can also be specified by the server 300.
  • the mobile terminal 200 After the user A completes the user registration, the mobile terminal 200 locally stores the user name and password information of the user A.
  • the username and password information may be entered by the user A into the mobile terminal 200, or may be transmitted by the server 300 in response to a request from the mobile terminal 200 (the mobile terminal lock client 290). Save the user name and password information, and / or the transmission should be safe (e.g., preclude the use of an encrypted form, including but not limited to MD5, SHA1) 0
  • the user A can also enter a user to the server and / or mobile terminal 300 200 A's contact information, for example, phone number, email address, work address, home address, etc.
  • the user A can lock the mobile terminal 200 in any of the following three ways: 1) transmitting, by the other mobile terminal (for example, the mobile terminal 210), an SMS message of a predetermined format to the mobile terminal 200, where the SMS message of the predetermined format includes lock instruction information;
  • the lock instruction information may include a lock instruction, a username, and password information.
  • the SMS message of the predetermined format mentioned in the above manner 1) can be expressed as the following j son format string:
  • operType is the operation type (lock means lock machine instruction)
  • log inld is the user name
  • pa s sword is the password information
  • log inld and pa s sword are all using MD5 force.
  • Confidential the corresponding plaintext information of the above username and password information are "admin” and "123456" respectively.
  • 2 is a flow chart showing a mobile terminal locking method 100 in accordance with an embodiment of the present invention. As shown in FIG.
  • the mobile terminal locking method 100 may include steps S110, S120, S1 30, S140, S150, S160, S170, and S180, where steps S1 10, S120, S1 30 constitute a mobile terminal locking branch, step S 14 G and S15 G constitute a mobile terminal positioning branch, step S160 constitutes a voice broadcast branch, and steps S170 and S180 constitute a data erasing branch.
  • the mobile terminal locking branch, the mobile terminal positioning branch, the voice broadcast branch, and the data erasing branch may be performed separately or in any combination, and are not limited to the specific operational sequence shown in FIG. 2.
  • the mobile terminal locking method 100 can be performed by the mobile terminal 200 shown in FIG. 1 or the mobile terminal locking client 290 installed in the mobile terminal 200.
  • FIG. 3 is a block diagram showing a mobile terminal 200 in accordance with an embodiment of the present invention.
  • the mobile terminal 200 may include a transceiver unit 210, a parsing unit 220, a verification unit 230, a locking unit 240, a positioning unit 250, a voice announcement unit 260, a data erasing unit 270, and a database 280.
  • the transceiver unit 210 is used for the mobile terminal 200 and the server 300 and/or Communication between other mobile terminals (e.g., mobile terminal 210), for example, may utilize the legacy hardware, firmware, and/or software architecture of the mobile terminal 200, such as a transceiver or the like.
  • the parsing unit 220 is configured to parse the lock instruction information.
  • the verification unit 230 is configured to verify the obtained user name and password information by using the user name and password information stored locally by the mobile terminal 200 (for example, stored in the database 280).
  • the locking unit 240 is configured to execute the lock instruction after the verification is successful, and lock the mobile terminal 200.
  • the positioning unit 250 is configured to perform a positioning function of the mobile terminal 200, and determine the location of the mobile terminal 200. For example, the original hardware, firmware, and/or software structure of the mobile terminal 200, such as a GPS positioning component, etc., may be utilized.
  • the voice broadcast unit 260 is configured to broadcast the contact information of the user A (for example, stored in the database 280), for example, can be broadcast using the speaker of the mobile terminal 200.
  • the data erasing unit 270 is configured to execute a data erasing instruction after backing up data in the mobile terminal 200 to the server 300 when the mobile terminal has been locked for more than a predetermined time (for example, 5 days, 10 days, 30 days), All data in the mobile terminal 200 is erased.
  • the parsing unit 220, the verifying unit 230, the locking unit 240, and the data erasing unit 270 may be implemented by the original hardware, firmware, and/or software structure of the mobile terminal 200, such as a processor or the like.
  • the database 280 is used to store various instructions and data required for processing, for example, the hardware, firmware, and/or software structures of the mobile terminal 200, such as memory, etc., may be utilized.
  • a separate database 280 is included in the structure of the mobile terminal 200 shown in FIG.
  • the present invention is not limited thereto, and the user name and password information may be directly stored in the verification unit 230, and the user's contact information may be directly stored in the voice broadcast unit 260 without having to include the independent database 280.
  • the mobile terminal locking method 100 and the mobile terminal 200 according to an embodiment of the present invention will be described in detail below with reference to FIGS. 2 and 3.
  • the transceiver unit 210 of the mobile terminal 200 receives the lock instruction information, and the parsing unit 220 parses the received lock instruction information to obtain a lock instruction, a username and password information.
  • the lock instruction information may be received by listening to an SMS message received by the mobile terminal 200 (for example, the foregoing lock mode 1), or may be received from the server 300 through the communication network 400 (for example, the foregoing lock) Mode 2 or 3).
  • step S120 the verification unit 230 of the mobile terminal 200 utilizes the mobile terminal 200 locally.
  • the stored username and password information is used to verify the obtained username and password information.
  • the user name and password information stored should be safe (e.g., preclude the use of an encrypted form, including but not limited to MD5, SHA1) 0 as the verification fails, no action, may return to step S110, the monitor continues And/or receive messages. If the verification is successful, step S130 is performed.
  • step S130 after the verification is successful, the locking unit 240 of the mobile terminal 200 executes the lock instruction to lock the mobile terminal 200.
  • the voice broadcast function of the voice broadcast unit 260 of the mobile terminal 200 is turned on, and the contact information of the user A of the mobile terminal 200 is broadcasted.
  • Contact information includes at least one of the following information: phone, email address, work address, home address.
  • the contact information of the user A can be previously input to the server 300 and/or the mobile terminal 200 by the user A.
  • the server 300 can transmit to the mobile terminal 200, for example, together with the lock instruction information, or separately after transmitting the lock instruction information.
  • User A's contact information can also be sent by User A along with the lock command information.
  • the voice announcement performed by the voice broadcast unit 260 may be continuously played, or may be performed periodically (for example, every 2 hours), or may be performed periodically (for example, every day at 10:00 am) .
  • the positioning function of the positioning unit 250 of the mobile terminal 200 is turned on to position the mobile terminal 200 in step S140.
  • the positioning unit 250 transmits the location information of the mobile terminal 200 to the server 300 via the communication network 400 via the transceiver unit 210 in step S150.
  • the positioning by the positioning unit 250 can be performed periodically (e.g., every 2 hours) or periodically (e.g., every day at 10:00 am).
  • the location unit 250 can also display and/or broadcast a prompt message that has transmitted the location information of the mobile terminal 200 through the mobile terminal 200.
  • the owner or the original user (user A) of the mobile terminal 200 can query the location information of the mobile terminal 200 via the server 300, for example, the motion trajectory of the mobile terminal 200 can be displayed in conjunction with the map.
  • step S170 when the mobile terminal has been locked for more than a predetermined time (for example, 5 days, 10 days, 30 days),
  • the data erasing unit 270 of the mobile terminal 200 backs up the data in the mobile terminal 200 to the server 300, and thereafter, in step S180, the data erasing unit 270 executes a data erasing instruction to erase all data in the mobile terminal 200.
  • the user A retrieves the mobile terminal 200, the user A can unlock the mobile terminal 200 and resume normal use of the mobile terminal 200.
  • user A can unlock mobile terminal 200 in any of the following four ways:
  • the unlocking instruction information may include an unlocking instruction, a username, and password information.
  • the SMS message of the predetermined format mentioned in the above manner 1) can be expressed as the following j son format string:
  • operType is the operation type (unlock means unlock command)
  • log inld is the user name
  • pas sword is the password information
  • log inld and pas sword are all MD5.
  • Confidential the corresponding plaintext information of the above user name and password information are "admin” and "123456" respectively.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention provides a method for locking a mobile terminal, the method comprising the steps of: receiving and parsing locking machine command information (S110), and obtaining a locking machine command, a user name and password information; verifying the obtained user name and password information (S120) by a user name and password information locally stored in the mobile terminal; after a successful verification, performing the locking machine command, and locking the mobile terminal (S130). The present invention further provides a mobile terminal for implementing the method for locking a mobile terminal.

Description

移动终端锁定方法和移动终端 技术领域  Mobile terminal locking method and mobile terminal
本发明涉及移动通信领域, 更具体地, 涉及一种移动终端锁定方法  The present invention relates to the field of mobile communications, and more particularly to a mobile terminal locking method
背景技术 Background technique
现有的移动终端防盗方法主要是通过在移动终端(如手机、 平板计 算机、 便携式计算机等) 中设置密码来防止移动终端丟失或被盗。 当密 码输入错误预定次数(例如, 可由用户设置)后, 移动终端中的数据将 被彻底删除。 这样做虽然保证了数据的安全性, 但并不利于找回移动终 端。 发明内容  The existing mobile terminal anti-theft method mainly prevents the mobile terminal from being lost or stolen by setting a password in a mobile terminal (such as a mobile phone, a tablet computer, a portable computer, etc.). When the password is entered incorrectly a predetermined number of times (for example, it can be set by the user), the data in the mobile terminal will be completely deleted. Although this guarantees the security of the data, it is not conducive to the recovery of the mobile terminal. Summary of the invention
本发明提供了一种移动终端锁定方法和一种用于实现上述移动终 端锁定方法的移动终端。 利用本发明, 用户可以主动向遗失的移动终端 发出锁定指令, 提高移动终端被找回的可能性。 具体地, 根据本发明的第一方案, 提供了一种移动终端锁定方法, 包括: 接收并解析锁机指令信息, 获得锁机指令、 用户名和密码信息; 利用移动终端本地存储的用户名和密码信息, 对所获得的用户名和密码 信息进行验证; 在验证成功后, 执行锁机指令, 锁定移动终端。 所述锁 机指令信息可以是通过监听移动终端所接收到的短消息服务 ( SMS )消息 而接收到的, 也可以是通过通信网络从服务器接收到的。  The present invention provides a mobile terminal locking method and a mobile terminal for implementing the above mobile terminal locking method. With the present invention, the user can actively issue a lock command to the lost mobile terminal to improve the possibility that the mobile terminal is retrieved. Specifically, according to a first aspect of the present invention, a mobile terminal locking method is provided, including: receiving and parsing a lock instruction information, obtaining a lock instruction, a user name and password information; and using a user name and password information locally stored by the mobile terminal , verify the obtained user name and password information; after successful verification, execute the lock instruction to lock the mobile terminal. The lock instruction information may be received by listening to a Short Message Service (SMS) message received by the mobile terminal, or may be received from a server through a communication network.
在一些实施例中, 所述移动终端锁定方法还可以包括: 在锁定移动 终端后, 开启语音播报功能, 播报移动终端的用户的联系信息, 所述联 系信息包括以下信息中的至少一项: 电话、 电子邮件地址、 工作地址、 住宅地址。  In some embodiments, the mobile terminal locking method may further include: after the mobile terminal is locked, the voice broadcast function is turned on, and the contact information of the user of the mobile terminal is broadcasted, and the contact information includes at least one of the following information: , email address, work address, residential address.
在一些实施例中, 所述移动终端锁定方法还可以包括: 在锁定移动 终端后, 开启定位功能, 对移动终端进行定位; 以及通过通信网络, 将 移动终端的位置信息发送至服务器。 In some embodiments, the mobile terminal locking method may further include: after the mobile terminal is locked, the positioning function is turned on, the mobile terminal is positioned; and the communication network is The location information of the mobile terminal is sent to the server.
在一些实施例中, 所述移动终端锁定方法还可以包括: 在锁定移动 终端后经过预定时间, 通过通信网络, 将移动终端中的数据备份到服务 器, 之后, 执行数据擦除指令, 擦除移动终端中的所有数据。  In some embodiments, the mobile terminal locking method may further include: backing up data in the mobile terminal to the server through the communication network after a predetermined time after locking the mobile terminal, and then performing a data erasing instruction, erasing the mobile All data in the terminal.
所述通信网络包括以下网络中的至少一项:互联网、移动通信网络。 根据本发明的第二方案, 提供了一种移动终端, 包括: 收发单元, 用于接收锁机指令信息; 解析单元,用于解析所接收到的锁机指令信息, 获得锁机指令、 用户名和密码信息; 验证单元, 用于利用移动终端本地 存储的用户名和密码信息, 对所获得的用户名和密码信息进行验证; 锁 定单元, 用于在验证成功后, 执行锁机指令, 锁定移动终端。 所述收发 单元可以通过监听移动终端所接收到的短消息 ( SMS )服务消息来接收所 述锁机指令信息,也可以通过通信网络从服务器接收所述锁机指令信息。  The communication network includes at least one of the following networks: the Internet, a mobile communication network. According to a second aspect of the present invention, a mobile terminal is provided, including: a transceiver unit, configured to receive lock instruction information; a parsing unit, configured to parse the received lock instruction information, obtain a lock instruction, a username, and The password information; the verification unit is configured to verify the obtained user name and password information by using the user name and password information stored locally by the mobile terminal; and the locking unit is configured to execute the lock instruction and lock the mobile terminal after the verification succeeds. The transceiver unit may receive the lock instruction information by monitoring a short message (SMS) service message received by the mobile terminal, or may receive the lock instruction information from a server through a communication network.
在一些实施例中, 所述移动终端还可以包括: 语音播 单元, 用于 在所述锁定单元锁定移动终端后, 开启语音播报功能, 播报移动终端的 用户的联系信息, 所述联系信息包括以下信息中的至少一项: 电话、 电 子邮件地址、 工作地址、 住宅地址。  In some embodiments, the mobile terminal may further include: a voice broadcast unit, configured to: after the locking unit locks the mobile terminal, enable a voice broadcast function, and broadcast the contact information of the user of the mobile terminal, where the contact information includes the following: At least one of the messages: phone, email address, work address, home address.
在一些实施例中, 所述移动终端还可以包括: 定位单元, 用于在所 述锁定单元锁定移动终端后, 开启定位功能, 对移动终端进行定位, 并 通过所述收发单元, 经由通信网络, 将移动终端的位置信息发送至服务 器。  In some embodiments, the mobile terminal may further include: a positioning unit, configured to: after the locking unit locks the mobile terminal, enable a positioning function, locate the mobile terminal, and pass the transceiver unit, via the communication network, Send the location information of the mobile terminal to the server.
在一些实施例中, 所述移动终端还可以包括: 数据擦除单元, 用于 在所述锁定单元锁定移动终端后经过预定时间, 通过所述收发单元, 经 由通信网络, 将移动终端中的数据备份到服务器, 之后, 执行数据擦除 指令, 擦除移动终端中的所有数据。  In some embodiments, the mobile terminal may further include: a data erasing unit, configured to: after the locking unit locks the mobile terminal, pass the predetermined time, through the transceiver unit, to data in the mobile terminal via the communication network After backing up to the server, a data erase command is executed to erase all data in the mobile terminal.
所述通信网络包括以下网络中的至少一项:互联网、移动通信网络。 利用本发明, 用户可以主动向遗失的移动终端发出锁定指令, 提高 移动终端被找回的可能性。 此外, 由于移动终端可以重复播报用户的其 他联系方式(电话、 电子邮件地址、 通信地址等), 便于拾到移动终端的 人主动与用户取得联系, 从而找回移动终端。 另外, 由于移动终端可以 主动上传移动终端的位置, 这也有利于用户找回移动终端。 最后, 由于 据内容的安全性。 附图说明 The communication network includes at least one of the following networks: the Internet, a mobile communication network. With the invention, the user can actively issue a lock command to the lost mobile terminal, thereby improving the possibility that the mobile terminal is retrieved. In addition, since the mobile terminal can repeatedly broadcast the user's other contact information (telephone, email address, communication address, etc.), it is convenient to pick up the mobile terminal. The person actively contacts the user to retrieve the mobile terminal. In addition, since the mobile terminal can actively upload the location of the mobile terminal, it is also advantageous for the user to retrieve the mobile terminal. Finally, due to the security of the content. DRAWINGS
通过下面结合附图说明本发明的优选实施例, 将使本发明的上述及 其它目的、 特征和优点更加清楚, 其中:  The above and other objects, features and advantages of the present invention will become more apparent from
图 1是示出了根据本发明的移动通信*** 1000的应用场景的示意 图。  Fig. 1 is a schematic diagram showing an application scenario of a mobile communication system 1000 according to the present invention.
图 2 是示出了根据本发明实施例的移动终端锁定方法 100 的流程 图。  2 is a flow chart showing a mobile terminal locking method 100 in accordance with an embodiment of the present invention.
图 3是示出了根据本发明实施例的移动终端 200的方框图。  FIG. 3 is a block diagram showing a mobile terminal 200 in accordance with an embodiment of the present invention.
在本发明的所有附图中, 相同或相似的结构均以相同或相似的附图 标记标识。 具体实施方式  In all the drawings of the present invention, the same or similar structures are identified by the same or similar reference numerals. detailed description
下面参照附图对本发明的优选实施例进行详细说明, 在描述过程中 省略了对于本发明来说是不必要的细节和功能, 以防止对本发明的理解 造成混淆。 以下, 以本发明应用于无线移动通信***的场景为例, 对本 发明进行了详细描述。 但本发明并不局限于此, 本发明也可以应用于固 定通信***、 有线通信***, 或者应用于无线移动通信***、 固定通信 ***、 有线通信***等的任意混合结构。 就移动通信***而言, 本发明 并不局限于所涉及的各个移动通信终端的具体通信协议, 可以包括但不 限于 2G、 3G、 4G、 5G网络, WCDMA, CDMA2000, TD- SCDMA***等, 不同 的移动终端可以釆用相同的通信协议, 也可以釆用不同的通信协议。 本 发明并不局限于移动终端的具体操作***, 可以包括但不限于 iOS、 Windows Mob i le , Symbian, Android等, 不同的移动终端可以釆用相同 的操作***, 也可以釆用不同的操作***。 图 1是示出了根据本发明的移动通信*** 1000的应用场景的示意 图。 如图 1所示, 移动通信*** 1000可以包括移动终端 200和 210、 服 务器 300、 计算机 500。 为了清楚起见, 图中仅示出了两个移动终端 200 和 210, 但本发明并不局限于此, 可以只包括一个移动终端 200, 也可以 包括三个或更多数目的移动终端。 移动终端 200和计算机 500可以属于 用户 A, 或者可以由用户 A操作。 移动终端 210可以属于用户 A, 也可以 属于另一用户, 用户 B。 移动终端 200和计算机 500可以通过通信网络 400与服务器 300相连。 通信网络 400的示例可以包括但不限于: 互联 网、 移动通信网络。 移动终端 200和移动终端 210之间可以经由无线通 信网络相连, 以进行各种通信(例如, 短消息服务(SMS )通信、 多媒体 消息服务(固 S )通信、 语音通信、 视频通信等)。 The preferred embodiments of the present invention are described in detail below with reference to the accompanying drawings, and the details and functions that are not necessary for the present invention are omitted in the description to avoid confusion of the understanding of the present invention. Hereinafter, the present invention will be described in detail by taking the scenario in which the present invention is applied to a wireless mobile communication system as an example. However, the present invention is not limited thereto, and the present invention is also applicable to a fixed communication system, a wired communication system, or an arbitrary hybrid structure applied to a wireless mobile communication system, a fixed communication system, a wired communication system, or the like. In the case of a mobile communication system, the present invention is not limited to the specific communication protocols of the respective mobile communication terminals involved, and may include, but is not limited to, 2G, 3G, 4G, 5G networks, WCDMA, CDMA2000, TD-SCDMA systems, etc. The mobile terminal can use the same communication protocol or use different communication protocols. The present invention is not limited to a specific operating system of a mobile terminal, and may include, but is not limited to, iOS, Windows Mob, Le, Symbian, Android, etc. Different mobile terminals may use the same operating system, or may use different operating systems. . FIG. 1 is a schematic diagram showing an application scenario of a mobile communication system 1000 according to the present invention. As shown in FIG. 1, the mobile communication system 1000 can include mobile terminals 200 and 210, a server 300, and a computer 500. For the sake of clarity, only two mobile terminals 200 and 210 are shown in the figure, but the present invention is not limited thereto, and may include only one mobile terminal 200, and may also include three or more mobile terminals. The mobile terminal 200 and the computer 500 may belong to the user A or may be operated by the user A. The mobile terminal 210 may belong to the user A or may belong to another user, the user B. Mobile terminal 200 and computer 500 can be coupled to server 300 via communication network 400. Examples of communication network 400 may include, but are not limited to: the Internet, a mobile communication network. The mobile terminal 200 and the mobile terminal 210 may be connected via a wireless communication network to perform various communications (eg, Short Message Service (SMS) communication, Multimedia Messaging Service (Solid S) communication, voice communication, video communication, etc.).
移动终端 200包括安装在其中的移动终端锁定客户端 290。 移动终 端锁定客户端 290可以由用户 A以软件的形式自行安装在移动终端 200 中, 或者可以由移动终端生产厂商以硬件或固件的形式安装在移动终端 200中。  The mobile terminal 200 includes a mobile terminal locking client 290 installed therein. The mobile terminal locking client 290 may be installed in the mobile terminal 200 by the user A in the form of software, or may be installed in the mobile terminal 200 in the form of hardware or firmware by the mobile terminal manufacturer.
在启用移动终端锁定客户端 290之前,用户 A需要完成向服务器 300 的注册过程。 用户 A可以通过计算机 500或移动终端 200中的浏览器, 以网页形式完成向服务器 300的注册过程; 也可以直接通过移动终端锁 定客户端 290完成向服务器 300的注册过程(例如, 在首次启动移动终 端锁定客户端 290时,提示用户 A完成)。用户 A向服务器 300注册用户 标识(用户名)和密码信息; 当然, 用户 A的用户名和密码信息也可以 由服务器 300指定。 用户 A完成用户注册之后, 移动终端 200本地保存 用户 A的用户名和密码信息。 用户名和密码信息可以是用户 A输入到移 动终端 200中的, 也可以是 Λ良务器 300才艮据移动终端 200 (移动终端锁 定客户端 290 )的请求而发送的。 用户名和密码信息的保存和 /或发送应 当是安全的(例如, 釆用加密的形式, 包括但不限于 MD5、 SHA1 )0 此外, 用户 A还可以向服务器 300和 /或移动终端 200中输入用户 A的联系信息, 例如, 电话、 电子邮件地址、 工作地址、 住宅地址等。 Before enabling the mobile terminal to lock the client 290, the user A needs to complete the registration process to the server 300. The user A can complete the registration process to the server 300 in the form of a webpage through the browser in the computer 500 or the mobile terminal 200. The registration process to the server 300 can also be completed directly by the mobile terminal locking client 290 (for example, when the mobile terminal is started for the first time) When the terminal locks the client 290, the user A is prompted to complete). User A registers the user identification (user name) and password information with the server 300; of course, the user name and password information of the user A can also be specified by the server 300. After the user A completes the user registration, the mobile terminal 200 locally stores the user name and password information of the user A. The username and password information may be entered by the user A into the mobile terminal 200, or may be transmitted by the server 300 in response to a request from the mobile terminal 200 (the mobile terminal lock client 290). Save the user name and password information, and / or the transmission should be safe (e.g., preclude the use of an encrypted form, including but not limited to MD5, SHA1) 0 In addition, the user A can also enter a user to the server and / or mobile terminal 300 200 A's contact information, for example, phone number, email address, work address, home address, etc.
当用户 A发现移动终端 200丟失时, 用户 A可以通过以下三种方式 中的任何一种对移动终端 200进行锁定: 1 ) 通过其他移动终端(例如, 移动终端 21 0 ), 向移动终端 200发 送预定格式的 SMS消息, 所述预定格式的 SMS消息包含锁机指 令信息; When the user A finds that the mobile terminal 200 is lost, the user A can lock the mobile terminal 200 in any of the following three ways: 1) transmitting, by the other mobile terminal (for example, the mobile terminal 210), an SMS message of a predetermined format to the mobile terminal 200, where the SMS message of the predetermined format includes lock instruction information;
2 ) 登录服务器 300 , 向移动终端 200 (移动终端锁定客户端 290 ) 发送锁机指令信息; 或者  2) logging in to the server 300, transmitting the lock instruction information to the mobile terminal 200 (the mobile terminal locking client 290); or
3 ) 通知***管理员, 通过服务器 300 , 向移动终端 200 (移动终 端锁定客户端 290 )发送锁机指令信息。  3) The system administrator is notified to send the lock instruction information to the mobile terminal 200 (the mobile terminal lock client 290) through the server 300.
锁机指令信息可以包括锁机指令、 用户名和密码信息。 例如, 上述 方式 1 )中所提到的预定格式的 SMS消息可以表示为以下 j son格式字符 串:  The lock instruction information may include a lock instruction, a username, and password information. For example, the SMS message of the predetermined format mentioned in the above manner 1) can be expressed as the following j son format string:
{"operType":"lock","loginId":"21232f297a57a5a743894a0e4a801fc3", Mpassword":"el0adc3949ba59abbe56e057f20f883e"}  {"operType":"lock","loginId":"21232f297a57a5a743894a0e4a801fc3", Mpassword":"el0adc3949ba59abbe56e057f20f883e"}
其中, operType为操作类型 ( lock表示锁机指令), log inld为用户名, pa s sword为密码信息, log inld及 pa s sword均釆用 MD5力。密, 以上用户 名和密码信息的对应明文信息分别为 "admin" 和 "123456"。 图 2 是示出了根据本发明实施例的移动终端锁定方法 100 的流程 图。如图 2所示,移动终端锁定方法 100可以包括步骤 S110、 S120、 S1 30、 S140、 S150、 S160、 S170和 S 180 , 其中, 步骤 S1 10、 S120、 S1 30构成 移动终端锁定分支,步骤 S 14 G、 S15 G构成移动终端定位分支, 步骤 S160 构成语音播报分支, 步骤 S170、 S180构成数据擦除分支。 根据本发明, 移动终端锁定分支、 移动终端定位分支、 语音播报分支和数据擦除分支 可以单独执行或任意组合执行, 并不局限于图 2所示的具体操作顺序。 例如, 移动终端锁定方法 100可以由图 1所示的移动终端 200或安装在 移动终端 200中的移动终端锁定客户端 290执行。 图 3是示出了根据本发明实施例的移动终端 200的方框图。 如图 3 所示, 移动终端 200可以包括收发单元 210、 解析单元 220、 验证单元 230、 锁定单元 240、 定位单元 250、 语音播报单元 260、 数据擦除单元 270和数据库 280。 收发单元 210用于移动终端 200与服务器 300和 /或 其他移动终端 (例如, 移动终端 210 )之间的通信, 例如, 可以利用移 动终端 200 原有的硬件、 固件和 /或软件结构, 如收发机等。 解析单元 220用于解析锁机指令信息。 验证单元 230用于利用移动终端 200本地 存储的用户名和密码信息(例如, 存储在数据库 280中), 对所获得的用 户名和密码信息进行验证。 锁定单元 240用于在验证成功后, 执行锁机 指令, 锁定移动终端 200。 定位单元 250用于执行移动终端 200的定位 功能, 确定移动终端 200的位置, 例如, 可以利用移动终端 200原有的 硬件、 固件和 /或软件结构, 如 GPS定位组件等。 语音播报单元 260用于 播报用户 A的联系信息(例如, 存储在数据库 280中), 例如, 可以利用 移动终端 200的扬声器进行播报。 数据擦除单元 270用于当移动终端已 被锁定超过预定时间(例如, 5天、 10天、 30天)时, 在将移动终端 200 中的数据备份到服务器 300之后,执行数据擦除指令,擦除移动终端 200 中的所有数据。 解析单元 220、验证单元 230、锁定单元 240和数据擦除 单元 270可以由移动终端 200原有的硬件、 固件和 /或软件结构实现,如 处理器等。 数据库 280用于存储处理所需的各种指令和数据, 例如, 可 以利用移动终端 200原有的硬件、 固件和 /或软件结构, 如存储器等。 作 为示例,在图 3所示的移动终端 200的结构中包括了独立的数据库 280。 但本发明并不局限于此, 也可以将用户名和密码信息直接存储在验证单 元 230中, 将用户的联系信息直接存储在语音播报单元 260中, 而不必 包括独立的数据库 280。 以下将结合图 2和图 3 , 对根据本发明实施例的移动终端锁定方法 100和移动终端 200进行详细的描述。 在步骤 S110, 移动终端 200的收发单元 210接收锁机指令信息, 解 析单元 220解析所接收到的锁机指令信息, 获得锁机指令、 用户名和密 码信息。所述锁机指令信息可以是通过监听移动终端 200所接收到的 SMS 消息而接收到的 (例如, 前述锁定方式 1 ), 也可以是通过通信网络 400 从服务器 300接收到的 (例如, 前述锁定方式 2或 3 )。 Among them, operType is the operation type (lock means lock machine instruction), log inld is the user name, pa s sword is the password information, log inld and pa s sword are all using MD5 force. Confidential, the corresponding plaintext information of the above username and password information are "admin" and "123456" respectively. 2 is a flow chart showing a mobile terminal locking method 100 in accordance with an embodiment of the present invention. As shown in FIG. 2, the mobile terminal locking method 100 may include steps S110, S120, S1 30, S140, S150, S160, S170, and S180, where steps S1 10, S120, S1 30 constitute a mobile terminal locking branch, step S 14 G and S15 G constitute a mobile terminal positioning branch, step S160 constitutes a voice broadcast branch, and steps S170 and S180 constitute a data erasing branch. According to the present invention, the mobile terminal locking branch, the mobile terminal positioning branch, the voice broadcast branch, and the data erasing branch may be performed separately or in any combination, and are not limited to the specific operational sequence shown in FIG. 2. For example, the mobile terminal locking method 100 can be performed by the mobile terminal 200 shown in FIG. 1 or the mobile terminal locking client 290 installed in the mobile terminal 200. FIG. 3 is a block diagram showing a mobile terminal 200 in accordance with an embodiment of the present invention. As shown in FIG. 3, the mobile terminal 200 may include a transceiver unit 210, a parsing unit 220, a verification unit 230, a locking unit 240, a positioning unit 250, a voice announcement unit 260, a data erasing unit 270, and a database 280. The transceiver unit 210 is used for the mobile terminal 200 and the server 300 and/or Communication between other mobile terminals (e.g., mobile terminal 210), for example, may utilize the legacy hardware, firmware, and/or software architecture of the mobile terminal 200, such as a transceiver or the like. The parsing unit 220 is configured to parse the lock instruction information. The verification unit 230 is configured to verify the obtained user name and password information by using the user name and password information stored locally by the mobile terminal 200 (for example, stored in the database 280). The locking unit 240 is configured to execute the lock instruction after the verification is successful, and lock the mobile terminal 200. The positioning unit 250 is configured to perform a positioning function of the mobile terminal 200, and determine the location of the mobile terminal 200. For example, the original hardware, firmware, and/or software structure of the mobile terminal 200, such as a GPS positioning component, etc., may be utilized. The voice broadcast unit 260 is configured to broadcast the contact information of the user A (for example, stored in the database 280), for example, can be broadcast using the speaker of the mobile terminal 200. The data erasing unit 270 is configured to execute a data erasing instruction after backing up data in the mobile terminal 200 to the server 300 when the mobile terminal has been locked for more than a predetermined time (for example, 5 days, 10 days, 30 days), All data in the mobile terminal 200 is erased. The parsing unit 220, the verifying unit 230, the locking unit 240, and the data erasing unit 270 may be implemented by the original hardware, firmware, and/or software structure of the mobile terminal 200, such as a processor or the like. The database 280 is used to store various instructions and data required for processing, for example, the hardware, firmware, and/or software structures of the mobile terminal 200, such as memory, etc., may be utilized. As an example, a separate database 280 is included in the structure of the mobile terminal 200 shown in FIG. However, the present invention is not limited thereto, and the user name and password information may be directly stored in the verification unit 230, and the user's contact information may be directly stored in the voice broadcast unit 260 without having to include the independent database 280. The mobile terminal locking method 100 and the mobile terminal 200 according to an embodiment of the present invention will be described in detail below with reference to FIGS. 2 and 3. In step S110, the transceiver unit 210 of the mobile terminal 200 receives the lock instruction information, and the parsing unit 220 parses the received lock instruction information to obtain a lock instruction, a username and password information. The lock instruction information may be received by listening to an SMS message received by the mobile terminal 200 (for example, the foregoing lock mode 1), or may be received from the server 300 through the communication network 400 (for example, the foregoing lock) Mode 2 or 3).
在步骤 S120 ,移动终端 200的验证单元 230利用移动终端 200本地 存储的用户名和密码信息, 对所获得的用户名和密码信息进行验证。 如 前所述, 用户名和密码信息的保存应当是安全的 (例如, 釆用加密的形 式, 包括但不限于 MD5、 SHA1 )0 如验证失败, 则不必执行任何操作, 可 以返回步骤 S110,继续监听和 /或接收消息。如验证成功,执行步骤 S130。 In step S120, the verification unit 230 of the mobile terminal 200 utilizes the mobile terminal 200 locally. The stored username and password information is used to verify the obtained username and password information. As described above, the user name and password information stored should be safe (e.g., preclude the use of an encrypted form, including but not limited to MD5, SHA1) 0 as the verification fails, no action, may return to step S110, the monitor continues And/or receive messages. If the verification is successful, step S130 is performed.
在步骤 S130, 在验证成功后, 移动终端 200的锁定单元 240执行锁 机指令, 锁定移动终端 200。 根据本发明的一些实施例, 在锁定移动终端 200后, 在步骤 S160 , 开启移动终端 200的语音播报单元 260的语音播报功能, 播报移动终端 200的用户 A的联系信息。 联系信息包括以下信息中的至少一项: 电话、 电子邮件地址、 工作地址、 住宅地址。 如前所述, 用户 A的联系信息可 以由用户 A预先输入服务器 300和 /或移动终端 200。在输入到服务器 300 的情况下, 服务器 300可以向移动终端 200发送, 例如, 与锁机指令信 息一起发送, 或在发送锁机指令信息之后, 单独发送。 用户 A的联系信 息也可以由用户 A与锁机指令信息一起发送。 语音播报单元 260所进行 的语音播报可以是持续循环播放的, 也可以是定期进行的 (例如, 每隔 2个小时一次), 或者, 也可以是定时进行的 (例如, 每天上午 10: 00 )。 根据本发明的一些实施例, 在锁定移动终端 200后, 在步骤 S140 , 开启移动终端 200的定位单元 250的定位功能, 对移动终端 200进行定 位。 在完成定位后, 在步骤 S150, 定位单元 250通过收发单元 210, 经 由通信网络 400,将移动终端 200的位置信息发送至服务器 300。定位单 元 250所进行的定位可以是定期进行的(例如, 每隔 2个小时一次 ), 也 可以是定时进行的(例如, 每天上午 10: 00 )。 此外, 定位单元 250还可 以通过移动终端 200显示和 /或播报已传送移动终端 200的位置信息的提 示消息。 这样, 移动终端 200的所有者或原使用者(用户 A )就可以通 过服务器 300查询移动终端 200的位置信息, 例如, 可结合地图展示移 动终端 200的运动轨迹。  In step S130, after the verification is successful, the locking unit 240 of the mobile terminal 200 executes the lock instruction to lock the mobile terminal 200. According to some embodiments of the present invention, after the mobile terminal 200 is locked, in step S160, the voice broadcast function of the voice broadcast unit 260 of the mobile terminal 200 is turned on, and the contact information of the user A of the mobile terminal 200 is broadcasted. Contact information includes at least one of the following information: phone, email address, work address, home address. As described above, the contact information of the user A can be previously input to the server 300 and/or the mobile terminal 200 by the user A. In the case of input to the server 300, the server 300 can transmit to the mobile terminal 200, for example, together with the lock instruction information, or separately after transmitting the lock instruction information. User A's contact information can also be sent by User A along with the lock command information. The voice announcement performed by the voice broadcast unit 260 may be continuously played, or may be performed periodically (for example, every 2 hours), or may be performed periodically (for example, every day at 10:00 am) . According to some embodiments of the present invention, after the mobile terminal 200 is locked, the positioning function of the positioning unit 250 of the mobile terminal 200 is turned on to position the mobile terminal 200 in step S140. After the positioning is completed, the positioning unit 250 transmits the location information of the mobile terminal 200 to the server 300 via the communication network 400 via the transceiver unit 210 in step S150. The positioning by the positioning unit 250 can be performed periodically (e.g., every 2 hours) or periodically (e.g., every day at 10:00 am). In addition, the location unit 250 can also display and/or broadcast a prompt message that has transmitted the location information of the mobile terminal 200 through the mobile terminal 200. Thus, the owner or the original user (user A) of the mobile terminal 200 can query the location information of the mobile terminal 200 via the server 300, for example, the motion trajectory of the mobile terminal 200 can be displayed in conjunction with the map.
根据本发明的一些实施例, 在锁定移动终端 200后, 在步骤 S170 , 当移动终端已被锁定超过预定时间 (例如, 5天、 10天、 30天)时, 移 动终端 200的数据擦除单元 270将移动终端 200中的数据备份到服务器 300, 之后, 在步骤 S180, 数据擦除单元 270执行数据擦除指令, 擦除 移动终端 200中的所有数据。 当用户 A找回移动终端 200后, 用户 A可以解除对移动终端 200的 锁定, 恢复对移动终端 200的正常使用。 例如, 用户 A可以通过以下四 种方式中的任何一种对移动终端 200进行解锁: According to some embodiments of the present invention, after the mobile terminal 200 is locked, in step S170, when the mobile terminal has been locked for more than a predetermined time (for example, 5 days, 10 days, 30 days), The data erasing unit 270 of the mobile terminal 200 backs up the data in the mobile terminal 200 to the server 300, and thereafter, in step S180, the data erasing unit 270 executes a data erasing instruction to erase all data in the mobile terminal 200. After the user A retrieves the mobile terminal 200, the user A can unlock the mobile terminal 200 and resume normal use of the mobile terminal 200. For example, user A can unlock mobile terminal 200 in any of the following four ways:
1 ) 通过其他移动终端(例如, 移动终端 210 ), 向移动终端 200发 送预定格式的 SMS消息, 所述预定格式的 SMS消息包含解锁指 令信息;  1) transmitting, by the other mobile terminal (for example, the mobile terminal 210), an SMS message of a predetermined format to the mobile terminal 200, where the SMS message of the predetermined format includes unlocking instruction information;
2 ) 登录服务器 300, 向移动终端 200 (移动终端锁定客户端 290 ) 发送解锁指令信息;  2) logging in to the server 300, sending unlocking instruction information to the mobile terminal 200 (mobile terminal locking client 290);
3 ) 通知***管理员, 通过服务器 300, 向移动终端 200 (移动终 端锁定客户端 290 )发送解锁指令信息; 或者  3) notifying the system administrator to send the unlocking instruction information to the mobile terminal 200 (the mobile terminal locking client 290) through the server 300; or
4 ) 在移动终端 200 (移动终端锁定客户端 290 )上输入正确的用 户名和密码信息。  4) Enter the correct username and password information on the mobile terminal 200 (mobile terminal lock client 290).
解锁指令信息可以包括解锁指令、 用户名和密码信息。 例如, 上述 方式 1 )中所提到的预定格式的 SMS消息可以表示为以下 j son格式字符 串:  The unlocking instruction information may include an unlocking instruction, a username, and password information. For example, the SMS message of the predetermined format mentioned in the above manner 1) can be expressed as the following j son format string:
{ "operType": "unlock","loginId": "21232f297a57a5a743894a0e4a801 fc3 ", Mpassword":"el0adc3949ba59abbe56e057f20f883e"}  { "operType": "unlock","loginId": "21232f297a57a5a743894a0e4a801 fc3 ", Mpassword":"el0adc3949ba59abbe56e057f20f883e"}
其中, operType为操作类型 (unlock表示解锁指令), log inld为用户 名, pas sword为密码信息, log inld及 pas sword均釆用 MD5力。密, 以上 用户名和密码信息的对应明文信息分别为 "admin" 和 "123456"。 Among them, operType is the operation type (unlock means unlock command), log inld is the user name, pas sword is the password information, log inld and pas sword are all MD5. Confidential, the corresponding plaintext information of the above user name and password information are "admin" and "123456" respectively.
至此已经结合优选实施例对本发明进行了描述。 应该理解, 本领域 技术人员在不脱离本发明的精神和范围的情况下, 可以进行各种其它的 改变、 替换和添加。 因此, 本发明的范围不局限于上述特定实施例, 而 应由所附权利要求所限定。 The invention has thus far been described in connection with the preferred embodiments. It will be appreciated that various other changes, substitutions and additions may be made by those skilled in the art without departing from the spirit and scope of the invention. Therefore, the scope of the invention is not limited to the specific embodiments described above, but by the appended claims.

Claims

权 利 要 求 Rights request
1. 一种移动终端锁定方法 (100), 包括: A mobile terminal locking method (100), comprising:
接收并解析锁机指令信息, 获得锁机指令、 用户名和密码信息 Receive and parse lock instruction information, obtain lock command, username and password information
(S110); (S110);
利用移动终端 ( 200 )本地存储的用户名和密码信息, 对所获得的 用户名和密码信息进行验证 (S120);  Using the username and password information stored locally by the mobile terminal (200), verifying the obtained username and password information (S120);
在验证成功后, 执行锁机指令, 锁定移动终端 ( 200 ) (S130)。 After the verification is successful, the lock instruction is executed to lock the mobile terminal (200) (S130).
2. 根据权利要求 1 所述的移动终端锁定方法(100), 其中所述 锁机指令信息是通过监听移动终端( 200 )所接收到的短消息服务( SMS ) 消息而接收到的。 The mobile terminal locking method (100) according to claim 1, wherein the lock instruction information is received by listening to a short message service (SMS) message received by the mobile terminal (200).
3. 根据权利要求 1 所述的移动终端锁定方法(100), 其中所述 锁机指令信息是通过通信网络( 400 )从服务器( 300 )接收到的。  The mobile terminal locking method (100) according to claim 1, wherein the lock instruction information is received from a server (300) through a communication network (400).
4. 根据权利要求 1所述的移动终端锁定方法( 100 ), 还包括: 在锁定移动终端 ( 200 )后, 开启定位功能, 对移动终端 ( 200 )进 行定位(S140); 以及  4. The mobile terminal locking method (100) according to claim 1, further comprising: after the mobile terminal (200) is locked, the positioning function is turned on, and the mobile terminal (200) is positioned (S140);
通过通信网络( 400 ), 将移动终端 ( 200 ) 的位置信息发送至服务 器( 300 ) (S150)。  The location information of the mobile terminal (200) is transmitted to the server (300) through the communication network (400) (S150).
5. 根据权利要求 1 ~ 4之一所述的移动终端锁定方法( 100 ), 还 包括:  The mobile terminal locking method (100) according to any one of claims 1 to 4, further comprising:
在锁定移动终端 ( 200 )后经过预定时间, 通过通信网络( 400 ), 将移动终端 ( 200 ) 中的数据备份到服务器( 300 ) (S170), 之后, 执行 数据擦除指令, 擦除移动终端 ( 200 ) 中的所有数据(S180)。  After a predetermined time elapses after the mobile terminal (200) is locked, the data in the mobile terminal (200) is backed up to the server (300) through the communication network (400) (S170), after which the data erasing command is executed to erase the mobile terminal. All data in ( 200 ) (S180).
6. 根据权利要求 3 ~ 5之一所述的移动终端锁定方法( 100 ), 其 中所述通信网络( 400 )包括以下网络中的至少一项: 互联网、 移动通信 网络。  The mobile terminal locking method (100) according to any one of claims 3 to 5, wherein the communication network (400) comprises at least one of the following: an internet, a mobile communication network.
7. 根据权利要求 1 ~ 6之一所述的移动终端锁定方法( 100 ), 还 包括:  The mobile terminal locking method (100) according to any one of claims 1 to 6, further comprising:
在锁定移动终端( 200 )后,开启语音播报功能,播报移动终端( 200 ) 的用户的联系信息 (S160), 所述联系信息包括以下信息中的至少一项: 电话、 电子邮件地址、 工作地址、 住宅地址。 After the mobile terminal (200) is locked, the voice broadcast function is turned on, and the contact information of the user of the mobile terminal (200) is broadcasted (S160), and the contact information includes at least one of the following information: Phone, email address, work address, residential address.
8. 一种移动终端 ( 200 ), 包括:  8. A mobile terminal (200) comprising:
收发单元(210 ), 用于接收锁机指令信息;  a transceiver unit (210), configured to receive lock instruction information;
解析单元( 220 ), 用于解析所接收到的锁机指令信息, 获得锁机指 令、 用户名和密码信息;  The parsing unit (220) is configured to parse the received lock instruction information, and obtain the lock instruction, the username and the password information;
验证单元( 230 ), 用于利用移动终端 ( 200 )本地存储的用户名和 密码信息, 对所获得的用户名和密码信息进行验证;  The verification unit (230) is configured to verify the obtained username and password information by using the user name and password information stored locally by the mobile terminal (200);
锁定单元( 240 ), 用于在验证成功后, 执行锁机指令, 锁定移动终 端 ( 200 )。  The locking unit (240) is configured to execute a lock instruction after the verification is successful, and lock the mobile terminal (200).
9. 根据权利要求 8 所述的移动终端 ( 200 ), 其中所述收发单元 ( 210 )通过监听移动终端( 200 )所接收到的短消息服务( SMS )消息来 接收所述锁机指令信息。  9. The mobile terminal (200) according to claim 8, wherein the transceiver unit (210) receives the lock instruction information by monitoring a short message service (SMS) message received by the mobile terminal (200).
10. 根据权利要求 8 所述的移动终端 ( 200 ), 其中所述收发单元 ( 210 )通过通信网络( 400 )从服务器 ( 300 )接收所述锁机指令信息。  10. The mobile terminal (200) according to claim 8, wherein the transceiver unit (210) receives the lock instruction information from a server (300) via a communication network (400).
11. 根据权利要求 8所述的移动终端 ( 200 ), 还包括:  11. The mobile terminal (200) according to claim 8, further comprising:
定位单元( 250 ), 用于在所述锁定单元 ( 240 )锁定移动终端后, 开启定位功能,对移动终端( 200 )进行定位,并通过所述收发单元( 210 ), 经由通信网络( 400 ),将移动终端( 200 )的位置信息发送至服务器( 300 )。  a positioning unit (250), configured to: after the locking unit (240) locks the mobile terminal, turn on the positioning function, locate the mobile terminal (200), and pass the transceiver unit (210), via the communication network (400) Sending the location information of the mobile terminal (200) to the server (300).
12. 根据权利要求 8 ~ 11之一所述的移动终端 ( 200 ), 还包括: 数据擦除单元( 270 ), 用于在所述锁定单元( 240 )锁定移动终端 The mobile terminal (200) according to any one of claims 8 to 11, further comprising: a data erasing unit (270) for locking the mobile terminal at the locking unit (240)
( 200 )后经过预定时间,通过所述收发单元( 210 ),经由通信网络( 400 ), 将移动终端( 200 )中的数据备份到服务器( 300 ), 之后, 执行数据擦除 指令, 擦除移动终端 ( 200 ) 中的所有数据。 After (200), the data in the mobile terminal (200) is backed up to the server (300) via the communication network (400) through the transceiver unit (210), and then the data erasing command is executed, and the data is erased. All data in the mobile terminal (200).
13. 根据权利要求 10 ~ 12之一所述的移动终端 ( 200 ), 其中所述 通信网络( 400 ) 包括以下网络中的至少一项: 互联网、 移动通信网络。  The mobile terminal (200) according to any one of claims 10 to 12, wherein the communication network (400) comprises at least one of the following: an internet, a mobile communication network.
14. 根据权利要求 8 ~ 13之一所述的移动终端 ( 200 ), 还包括: 语音播报单元( 260 ), 用于在所述锁定单元( 240 )锁定移动终端 The mobile terminal (200) according to any one of claims 8 to 13, further comprising: a voice broadcast unit (260), configured to lock the mobile terminal at the locking unit (240)
( 200 )后, 开启语音播报功能, 播报移动终端 ( 200 ) 的用户的联系信 息, 所述联系信息包括以下信息中的至少一项: 电话、 电子邮件地址、 工作地址、 住宅地址。 After (200), the voice broadcast function is turned on, and the contact information of the user of the mobile terminal (200) is broadcasted, and the contact information includes at least one of the following information: a phone, an email address, a work address, and a home address.
PCT/CN2013/072281 2012-11-30 2013-03-07 Method and mobile terminal for locking mobile terminal WO2014082396A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201210507131XA CN103024160A (en) 2012-11-30 2012-11-30 Mobile terminal locking method and mobile terminal
CN201210507131.X 2012-11-30

Publications (1)

Publication Number Publication Date
WO2014082396A1 true WO2014082396A1 (en) 2014-06-05

Family

ID=47972272

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2013/072281 WO2014082396A1 (en) 2012-11-30 2013-03-07 Method and mobile terminal for locking mobile terminal

Country Status (2)

Country Link
CN (1) CN103024160A (en)
WO (1) WO2014082396A1 (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103581444A (en) * 2013-11-21 2014-02-12 北京网秦天下科技有限公司 Mobile phone and mobile phone safety system as well as corresponding methods
CN106778388A (en) * 2015-11-25 2017-05-31 神讯电脑(昆山)有限公司 Communication device and its establishing method
CN105844741A (en) * 2016-03-17 2016-08-10 苏州八方电机科技有限公司 Locking and unlocking method, locking and unlocking apparatus and authorization method for electric car
CN106713812A (en) * 2016-12-21 2017-05-24 维沃移动通信有限公司 Video communication method and mobile terminal
CN109561068A (en) * 2018-10-23 2019-04-02 芜湖汉科信息技术有限公司 A kind of information terminal safety system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101222517A (en) * 2007-12-21 2008-07-16 深圳市赛格导航科技股份有限公司 Mobile communication terminal and its anti-theft method
CN101389100A (en) * 2008-10-24 2009-03-18 Tcl天一移动通信(深圳)有限公司 Personal information protecting method for mobile communication terminal equipment
CN101453701A (en) * 2007-11-30 2009-06-10 希姆通信息技术(上海)有限公司 Mobile phone information remote control method

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101018375B (en) * 2007-01-29 2011-11-30 中兴通讯股份有限公司 Method for remotely controlling the terminal data
CN100563391C (en) * 2007-09-03 2009-11-25 华为技术有限公司 The method of mobile communications terminal data protection, system and equipment
CN101594615B (en) * 2008-12-01 2011-04-20 北京易路联动技术有限公司 Method, system and equipment for network management of terminal triple information security
CN102404328B (en) * 2011-11-25 2014-07-16 中国科学院深圳先进技术研究院 Electronic identity card verification system
CN102739868B (en) * 2012-06-18 2016-07-13 北京奇虎科技有限公司 The loss processing method of mobile terminal and system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101453701A (en) * 2007-11-30 2009-06-10 希姆通信息技术(上海)有限公司 Mobile phone information remote control method
CN101222517A (en) * 2007-12-21 2008-07-16 深圳市赛格导航科技股份有限公司 Mobile communication terminal and its anti-theft method
CN101389100A (en) * 2008-10-24 2009-03-18 Tcl天一移动通信(深圳)有限公司 Personal information protecting method for mobile communication terminal equipment

Also Published As

Publication number Publication date
CN103024160A (en) 2013-04-03

Similar Documents

Publication Publication Date Title
US8213971B2 (en) Apparatus and method for activating computer applications with SMS messaging
US9842446B2 (en) Systems and methods for lock access management using wireless signals
US20180337974A1 (en) Remotely Locating and Commanding a Mobile Device
US8666367B2 (en) Remotely locating and commanding a mobile device
US8660530B2 (en) Remotely receiving and communicating commands to a mobile device for execution by the mobile device
WO2014032612A1 (en) Method, device, server, system, and apparatus for preventing information leakage
US8554176B2 (en) Method and apparatus for creating a remotely activated secure backup service for mobile handsets
WO2016127845A1 (en) Operating method for voice authentication system and device
WO2014089937A1 (en) Mobile terminal intelligent anti-theft method and mobile terminal
WO2014082396A1 (en) Method and mobile terminal for locking mobile terminal
JP2015507894A (en) Anti-theft protection method and device for mobile phone
CN101155212A (en) Method for limiting use of mobile terminal
WO2016134657A1 (en) Operating method for push authentication system and device
CN107682363B (en) Intelligent household product safety communication method, system and computer readable storage medium
CN106559213B (en) Equipment management method, equipment and system
CN101163290A (en) Method of limiting use of mobile terminal through machine-card mutual authentication
US20230171248A1 (en) Password recovery method and system, and cloud server and electronic device
WO2014086222A1 (en) Method and apparatus for setting video call parameters and sending capability parameters
WO2011140756A1 (en) Mobile terminal, data protection method of mobile terminal and monitor system of mobile terminal
US20190037612A1 (en) Connecting method to an information capture device
CN108702705A (en) A kind of information transferring method and equipment
CN103731422A (en) Trusted access method and device of network device
WO2019191908A1 (en) Voice translation method and apparatus
CN101163327A (en) Method of limiting use region of mobile terminal through network information
WO2015149309A1 (en) Data processing method and terminal

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13858739

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205N DATED 06/08/2015)

122 Ep: pct application non-entry in european phase

Ref document number: 13858739

Country of ref document: EP

Kind code of ref document: A1