WO2014082396A1 - Procédé pour bloquer un terminal mobile, et terminal mobile - Google Patents

Procédé pour bloquer un terminal mobile, et terminal mobile Download PDF

Info

Publication number
WO2014082396A1
WO2014082396A1 PCT/CN2013/072281 CN2013072281W WO2014082396A1 WO 2014082396 A1 WO2014082396 A1 WO 2014082396A1 CN 2013072281 W CN2013072281 W CN 2013072281W WO 2014082396 A1 WO2014082396 A1 WO 2014082396A1
Authority
WO
WIPO (PCT)
Prior art keywords
mobile terminal
information
unit
communication network
locking
Prior art date
Application number
PCT/CN2013/072281
Other languages
English (en)
Chinese (zh)
Inventor
贾凌
Original Assignee
北京网秦天下科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京网秦天下科技有限公司 filed Critical 北京网秦天下科技有限公司
Publication of WO2014082396A1 publication Critical patent/WO2014082396A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • H04M1/67Preventing unauthorised calls from a telephone set by electronic means
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • H04W12/082Access security using revocation of authorisation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling

Definitions

  • the present invention relates to the field of mobile communications, and more particularly to a mobile terminal locking method
  • the existing mobile terminal anti-theft method mainly prevents the mobile terminal from being lost or stolen by setting a password in a mobile terminal (such as a mobile phone, a tablet computer, a portable computer, etc.).
  • a mobile terminal such as a mobile phone, a tablet computer, a portable computer, etc.
  • the password is entered incorrectly a predetermined number of times (for example, it can be set by the user), the data in the mobile terminal will be completely deleted. Although this guarantees the security of the data, it is not conducive to the recovery of the mobile terminal.
  • the present invention provides a mobile terminal locking method and a mobile terminal for implementing the above mobile terminal locking method.
  • the user can actively issue a lock command to the lost mobile terminal to improve the possibility that the mobile terminal is retrieved.
  • a mobile terminal locking method including: receiving and parsing a lock instruction information, obtaining a lock instruction, a user name and password information; and using a user name and password information locally stored by the mobile terminal , verify the obtained user name and password information; after successful verification, execute the lock instruction to lock the mobile terminal.
  • the lock instruction information may be received by listening to a Short Message Service (SMS) message received by the mobile terminal, or may be received from a server through a communication network.
  • SMS Short Message Service
  • the mobile terminal locking method may further include: after the mobile terminal is locked, the voice broadcast function is turned on, and the contact information of the user of the mobile terminal is broadcasted, and the contact information includes at least one of the following information: , email address, work address, residential address.
  • the mobile terminal locking method may further include: after the mobile terminal is locked, the positioning function is turned on, the mobile terminal is positioned; and the communication network is The location information of the mobile terminal is sent to the server.
  • the mobile terminal locking method may further include: backing up data in the mobile terminal to the server through the communication network after a predetermined time after locking the mobile terminal, and then performing a data erasing instruction, erasing the mobile All data in the terminal.
  • the communication network includes at least one of the following networks: the Internet, a mobile communication network.
  • a mobile terminal including: a transceiver unit, configured to receive lock instruction information; a parsing unit, configured to parse the received lock instruction information, obtain a lock instruction, a username, and The password information; the verification unit is configured to verify the obtained user name and password information by using the user name and password information stored locally by the mobile terminal; and the locking unit is configured to execute the lock instruction and lock the mobile terminal after the verification succeeds.
  • the transceiver unit may receive the lock instruction information by monitoring a short message (SMS) service message received by the mobile terminal, or may receive the lock instruction information from a server through a communication network.
  • SMS short message
  • the mobile terminal may further include: a voice broadcast unit, configured to: after the locking unit locks the mobile terminal, enable a voice broadcast function, and broadcast the contact information of the user of the mobile terminal, where the contact information includes the following: At least one of the messages: phone, email address, work address, home address.
  • a voice broadcast unit configured to: after the locking unit locks the mobile terminal, enable a voice broadcast function, and broadcast the contact information of the user of the mobile terminal, where the contact information includes the following: At least one of the messages: phone, email address, work address, home address.
  • the mobile terminal may further include: a positioning unit, configured to: after the locking unit locks the mobile terminal, enable a positioning function, locate the mobile terminal, and pass the transceiver unit, via the communication network, Send the location information of the mobile terminal to the server.
  • a positioning unit configured to: after the locking unit locks the mobile terminal, enable a positioning function, locate the mobile terminal, and pass the transceiver unit, via the communication network, Send the location information of the mobile terminal to the server.
  • the mobile terminal may further include: a data erasing unit, configured to: after the locking unit locks the mobile terminal, pass the predetermined time, through the transceiver unit, to data in the mobile terminal via the communication network After backing up to the server, a data erase command is executed to erase all data in the mobile terminal.
  • a data erasing unit configured to: after the locking unit locks the mobile terminal, pass the predetermined time, through the transceiver unit, to data in the mobile terminal via the communication network After backing up to the server, a data erase command is executed to erase all data in the mobile terminal.
  • the communication network includes at least one of the following networks: the Internet, a mobile communication network.
  • the user can actively issue a lock command to the lost mobile terminal, thereby improving the possibility that the mobile terminal is retrieved.
  • the mobile terminal can repeatedly broadcast the user's other contact information (telephone, email address, communication address, etc.), it is convenient to pick up the mobile terminal.
  • the person actively contacts the user to retrieve the mobile terminal.
  • the mobile terminal can actively upload the location of the mobile terminal, it is also advantageous for the user to retrieve the mobile terminal. Finally, due to the security of the content.
  • Fig. 1 is a schematic diagram showing an application scenario of a mobile communication system 1000 according to the present invention.
  • FIG. 2 is a flow chart showing a mobile terminal locking method 100 in accordance with an embodiment of the present invention.
  • FIG. 3 is a block diagram showing a mobile terminal 200 in accordance with an embodiment of the present invention.
  • the present invention will be described in detail by taking the scenario in which the present invention is applied to a wireless mobile communication system as an example.
  • the present invention is not limited thereto, and the present invention is also applicable to a fixed communication system, a wired communication system, or an arbitrary hybrid structure applied to a wireless mobile communication system, a fixed communication system, a wired communication system, or the like.
  • FIG. 1 is a schematic diagram showing an application scenario of a mobile communication system 1000 according to the present invention. As shown in FIG.
  • the mobile communication system 1000 can include mobile terminals 200 and 210, a server 300, and a computer 500.
  • mobile terminals 200 and 210 For the sake of clarity, only two mobile terminals 200 and 210 are shown in the figure, but the present invention is not limited thereto, and may include only one mobile terminal 200, and may also include three or more mobile terminals.
  • the mobile terminal 200 and the computer 500 may belong to the user A or may be operated by the user A.
  • the mobile terminal 210 may belong to the user A or may belong to another user, the user B.
  • Mobile terminal 200 and computer 500 can be coupled to server 300 via communication network 400.
  • Examples of communication network 400 may include, but are not limited to: the Internet, a mobile communication network.
  • the mobile terminal 200 and the mobile terminal 210 may be connected via a wireless communication network to perform various communications (eg, Short Message Service (SMS) communication, Multimedia Messaging Service (Solid S) communication, voice communication, video communication, etc.).
  • SMS Short Message Service
  • Solid S Multimedia Mess
  • the mobile terminal 200 includes a mobile terminal locking client 290 installed therein.
  • the mobile terminal locking client 290 may be installed in the mobile terminal 200 by the user A in the form of software, or may be installed in the mobile terminal 200 in the form of hardware or firmware by the mobile terminal manufacturer.
  • the user A Before enabling the mobile terminal to lock the client 290, the user A needs to complete the registration process to the server 300.
  • the user A can complete the registration process to the server 300 in the form of a webpage through the browser in the computer 500 or the mobile terminal 200.
  • the registration process to the server 300 can also be completed directly by the mobile terminal locking client 290 (for example, when the mobile terminal is started for the first time)
  • the terminal locks the client 290 the user A is prompted to complete).
  • User A registers the user identification (user name) and password information with the server 300; of course, the user name and password information of the user A can also be specified by the server 300.
  • the mobile terminal 200 After the user A completes the user registration, the mobile terminal 200 locally stores the user name and password information of the user A.
  • the username and password information may be entered by the user A into the mobile terminal 200, or may be transmitted by the server 300 in response to a request from the mobile terminal 200 (the mobile terminal lock client 290). Save the user name and password information, and / or the transmission should be safe (e.g., preclude the use of an encrypted form, including but not limited to MD5, SHA1) 0
  • the user A can also enter a user to the server and / or mobile terminal 300 200 A's contact information, for example, phone number, email address, work address, home address, etc.
  • the user A can lock the mobile terminal 200 in any of the following three ways: 1) transmitting, by the other mobile terminal (for example, the mobile terminal 210), an SMS message of a predetermined format to the mobile terminal 200, where the SMS message of the predetermined format includes lock instruction information;
  • the lock instruction information may include a lock instruction, a username, and password information.
  • the SMS message of the predetermined format mentioned in the above manner 1) can be expressed as the following j son format string:
  • operType is the operation type (lock means lock machine instruction)
  • log inld is the user name
  • pa s sword is the password information
  • log inld and pa s sword are all using MD5 force.
  • Confidential the corresponding plaintext information of the above username and password information are "admin” and "123456" respectively.
  • 2 is a flow chart showing a mobile terminal locking method 100 in accordance with an embodiment of the present invention. As shown in FIG.
  • the mobile terminal locking method 100 may include steps S110, S120, S1 30, S140, S150, S160, S170, and S180, where steps S1 10, S120, S1 30 constitute a mobile terminal locking branch, step S 14 G and S15 G constitute a mobile terminal positioning branch, step S160 constitutes a voice broadcast branch, and steps S170 and S180 constitute a data erasing branch.
  • the mobile terminal locking branch, the mobile terminal positioning branch, the voice broadcast branch, and the data erasing branch may be performed separately or in any combination, and are not limited to the specific operational sequence shown in FIG. 2.
  • the mobile terminal locking method 100 can be performed by the mobile terminal 200 shown in FIG. 1 or the mobile terminal locking client 290 installed in the mobile terminal 200.
  • FIG. 3 is a block diagram showing a mobile terminal 200 in accordance with an embodiment of the present invention.
  • the mobile terminal 200 may include a transceiver unit 210, a parsing unit 220, a verification unit 230, a locking unit 240, a positioning unit 250, a voice announcement unit 260, a data erasing unit 270, and a database 280.
  • the transceiver unit 210 is used for the mobile terminal 200 and the server 300 and/or Communication between other mobile terminals (e.g., mobile terminal 210), for example, may utilize the legacy hardware, firmware, and/or software architecture of the mobile terminal 200, such as a transceiver or the like.
  • the parsing unit 220 is configured to parse the lock instruction information.
  • the verification unit 230 is configured to verify the obtained user name and password information by using the user name and password information stored locally by the mobile terminal 200 (for example, stored in the database 280).
  • the locking unit 240 is configured to execute the lock instruction after the verification is successful, and lock the mobile terminal 200.
  • the positioning unit 250 is configured to perform a positioning function of the mobile terminal 200, and determine the location of the mobile terminal 200. For example, the original hardware, firmware, and/or software structure of the mobile terminal 200, such as a GPS positioning component, etc., may be utilized.
  • the voice broadcast unit 260 is configured to broadcast the contact information of the user A (for example, stored in the database 280), for example, can be broadcast using the speaker of the mobile terminal 200.
  • the data erasing unit 270 is configured to execute a data erasing instruction after backing up data in the mobile terminal 200 to the server 300 when the mobile terminal has been locked for more than a predetermined time (for example, 5 days, 10 days, 30 days), All data in the mobile terminal 200 is erased.
  • the parsing unit 220, the verifying unit 230, the locking unit 240, and the data erasing unit 270 may be implemented by the original hardware, firmware, and/or software structure of the mobile terminal 200, such as a processor or the like.
  • the database 280 is used to store various instructions and data required for processing, for example, the hardware, firmware, and/or software structures of the mobile terminal 200, such as memory, etc., may be utilized.
  • a separate database 280 is included in the structure of the mobile terminal 200 shown in FIG.
  • the present invention is not limited thereto, and the user name and password information may be directly stored in the verification unit 230, and the user's contact information may be directly stored in the voice broadcast unit 260 without having to include the independent database 280.
  • the mobile terminal locking method 100 and the mobile terminal 200 according to an embodiment of the present invention will be described in detail below with reference to FIGS. 2 and 3.
  • the transceiver unit 210 of the mobile terminal 200 receives the lock instruction information, and the parsing unit 220 parses the received lock instruction information to obtain a lock instruction, a username and password information.
  • the lock instruction information may be received by listening to an SMS message received by the mobile terminal 200 (for example, the foregoing lock mode 1), or may be received from the server 300 through the communication network 400 (for example, the foregoing lock) Mode 2 or 3).
  • step S120 the verification unit 230 of the mobile terminal 200 utilizes the mobile terminal 200 locally.
  • the stored username and password information is used to verify the obtained username and password information.
  • the user name and password information stored should be safe (e.g., preclude the use of an encrypted form, including but not limited to MD5, SHA1) 0 as the verification fails, no action, may return to step S110, the monitor continues And/or receive messages. If the verification is successful, step S130 is performed.
  • step S130 after the verification is successful, the locking unit 240 of the mobile terminal 200 executes the lock instruction to lock the mobile terminal 200.
  • the voice broadcast function of the voice broadcast unit 260 of the mobile terminal 200 is turned on, and the contact information of the user A of the mobile terminal 200 is broadcasted.
  • Contact information includes at least one of the following information: phone, email address, work address, home address.
  • the contact information of the user A can be previously input to the server 300 and/or the mobile terminal 200 by the user A.
  • the server 300 can transmit to the mobile terminal 200, for example, together with the lock instruction information, or separately after transmitting the lock instruction information.
  • User A's contact information can also be sent by User A along with the lock command information.
  • the voice announcement performed by the voice broadcast unit 260 may be continuously played, or may be performed periodically (for example, every 2 hours), or may be performed periodically (for example, every day at 10:00 am) .
  • the positioning function of the positioning unit 250 of the mobile terminal 200 is turned on to position the mobile terminal 200 in step S140.
  • the positioning unit 250 transmits the location information of the mobile terminal 200 to the server 300 via the communication network 400 via the transceiver unit 210 in step S150.
  • the positioning by the positioning unit 250 can be performed periodically (e.g., every 2 hours) or periodically (e.g., every day at 10:00 am).
  • the location unit 250 can also display and/or broadcast a prompt message that has transmitted the location information of the mobile terminal 200 through the mobile terminal 200.
  • the owner or the original user (user A) of the mobile terminal 200 can query the location information of the mobile terminal 200 via the server 300, for example, the motion trajectory of the mobile terminal 200 can be displayed in conjunction with the map.
  • step S170 when the mobile terminal has been locked for more than a predetermined time (for example, 5 days, 10 days, 30 days),
  • the data erasing unit 270 of the mobile terminal 200 backs up the data in the mobile terminal 200 to the server 300, and thereafter, in step S180, the data erasing unit 270 executes a data erasing instruction to erase all data in the mobile terminal 200.
  • the user A retrieves the mobile terminal 200, the user A can unlock the mobile terminal 200 and resume normal use of the mobile terminal 200.
  • user A can unlock mobile terminal 200 in any of the following four ways:
  • the unlocking instruction information may include an unlocking instruction, a username, and password information.
  • the SMS message of the predetermined format mentioned in the above manner 1) can be expressed as the following j son format string:
  • operType is the operation type (unlock means unlock command)
  • log inld is the user name
  • pas sword is the password information
  • log inld and pas sword are all MD5.
  • Confidential the corresponding plaintext information of the above user name and password information are "admin” and "123456" respectively.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

La présente invention concerne un procédé pour bloquer un terminal mobile. Le procédé consiste : à recevoir et analyser des informations de commande de machine de blocage (S110) et à obtenir une commande de machine de blocage, un nom d'utilisateur et des informations de mot de passe; à comparer le nom d'utilisateur et les informations de mot de passe obtenus (S120) à un nom d'utilisateur et des informations de mot de passe enregistrés localement dans le terminal mobile; enfin, une fois la comparaison réussie, à exécuter la commande de machine de blocage et à bloquer le terminal mobile (S130). La présente invention concerne également un terminal mobile pour exécuter le procédé pour bloquer un terminal mobile.
PCT/CN2013/072281 2012-11-30 2013-03-07 Procédé pour bloquer un terminal mobile, et terminal mobile WO2014082396A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201210507131.X 2012-11-30
CN201210507131XA CN103024160A (zh) 2012-11-30 2012-11-30 移动终端锁定方法和移动终端

Publications (1)

Publication Number Publication Date
WO2014082396A1 true WO2014082396A1 (fr) 2014-06-05

Family

ID=47972272

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2013/072281 WO2014082396A1 (fr) 2012-11-30 2013-03-07 Procédé pour bloquer un terminal mobile, et terminal mobile

Country Status (2)

Country Link
CN (1) CN103024160A (fr)
WO (1) WO2014082396A1 (fr)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103581444A (zh) * 2013-11-21 2014-02-12 北京网秦天下科技有限公司 手机和手机安全***以及相应的方法
CN106778388A (zh) * 2015-11-25 2017-05-31 神讯电脑(昆山)有限公司 通讯装置及其设定方法
CN105844741A (zh) * 2016-03-17 2016-08-10 苏州八方电机科技有限公司 一种电动车锁定解锁方法、锁定解锁装置和授权方法
CN106713812A (zh) * 2016-12-21 2017-05-24 维沃移动通信有限公司 一种视频通信方法及移动终端
CN109561068A (zh) * 2018-10-23 2019-04-02 芜湖汉科信息技术有限公司 一种信息终端安全保护***

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101222517A (zh) * 2007-12-21 2008-07-16 深圳市赛格导航科技股份有限公司 一种移动通信终端防盗方法及移动通信终端
CN101389100A (zh) * 2008-10-24 2009-03-18 Tcl天一移动通信(深圳)有限公司 一种移动通讯终端设备的个人信息保护方法
CN101453701A (zh) * 2007-11-30 2009-06-10 希姆通信息技术(上海)有限公司 手机信息远程控制方法

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101018375B (zh) * 2007-01-29 2011-11-30 中兴通讯股份有限公司 对终端数据实现远程控制的方法
CN100563391C (zh) * 2007-09-03 2009-11-25 华为技术有限公司 移动通信终端设备数据保护的方法、***及设备
CN101594615B (zh) * 2008-12-01 2011-04-20 北京易路联动技术有限公司 终端三重信息安全的网络化管理方法、***及设备
CN102404328B (zh) * 2011-11-25 2014-07-16 中国科学院深圳先进技术研究院 电子身份证验证***
CN102739868B (zh) * 2012-06-18 2016-07-13 北京奇虎科技有限公司 移动终端的丢失处理方法及***

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101453701A (zh) * 2007-11-30 2009-06-10 希姆通信息技术(上海)有限公司 手机信息远程控制方法
CN101222517A (zh) * 2007-12-21 2008-07-16 深圳市赛格导航科技股份有限公司 一种移动通信终端防盗方法及移动通信终端
CN101389100A (zh) * 2008-10-24 2009-03-18 Tcl天一移动通信(深圳)有限公司 一种移动通讯终端设备的个人信息保护方法

Also Published As

Publication number Publication date
CN103024160A (zh) 2013-04-03

Similar Documents

Publication Publication Date Title
US8213971B2 (en) Apparatus and method for activating computer applications with SMS messaging
US9842446B2 (en) Systems and methods for lock access management using wireless signals
US20180337974A1 (en) Remotely Locating and Commanding a Mobile Device
US8666367B2 (en) Remotely locating and commanding a mobile device
US8660530B2 (en) Remotely receiving and communicating commands to a mobile device for execution by the mobile device
WO2014032612A1 (fr) Procédé, dispositif, serveur, système, et appareil pour empêcher la divulgation de données
US8554176B2 (en) Method and apparatus for creating a remotely activated secure backup service for mobile handsets
WO2017096970A1 (fr) Procédé et dispositif pour déterminer un emplacement de dispositif portable cible
WO2014089937A1 (fr) Procédé antivol intelligent pour terminal mobile, et terminal mobile
WO2014082396A1 (fr) Procédé pour bloquer un terminal mobile, et terminal mobile
JP2015507894A (ja) 携帯電話のための盗難防止保護方法およびデバイス
WO2016134657A1 (fr) Procédé de fonctionnement pour un système et un dispositif d'authentification d'envoi
CN101155212A (zh) 一种限制移动终端使用的方法
CN107682363B (zh) 智能家居产品安全通讯方法、***及计算机可读存储介质
CN106559213B (zh) 设备管理方法、设备及***
CN101163290A (zh) 一种通过机卡相互认证限制移动终端使用的方法
WO2014086222A1 (fr) Procédé et appareil pour régler des paramètres d'appel vidéo et envoyer des paramètres de capacité
WO2021227879A1 (fr) Procédé et système de récupération de mot de passe, serveur en nuage et dispositif électronique
WO2011140756A1 (fr) Terminal mobile, procédé de protection de données d'un terminal mobile et système de dispositif de surveillance d'un terminal mobile
US20190037612A1 (en) Connecting method to an information capture device
CN108702705A (zh) 一种信息传输方法及设备
KR20130073801A (ko) 이동 단말의 원격 제어 방법 및 그 이동 단말
CN118250090A (zh) 物联网平台信息处理方法及装置
JP5268273B2 (ja) 電子決済システム及び電子決済方法
WO2019191908A1 (fr) Procédé et appareil de traduction vocale

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13858739

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205N DATED 06/08/2015)

122 Ep: pct application non-entry in european phase

Ref document number: 13858739

Country of ref document: EP

Kind code of ref document: A1