WO2015085941A1 - 被盗终端的处理方法及设备 - Google Patents

被盗终端的处理方法及设备 Download PDF

Info

Publication number
WO2015085941A1
WO2015085941A1 PCT/CN2014/093637 CN2014093637W WO2015085941A1 WO 2015085941 A1 WO2015085941 A1 WO 2015085941A1 CN 2014093637 W CN2014093637 W CN 2014093637W WO 2015085941 A1 WO2015085941 A1 WO 2015085941A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
status
modification message
server
state
Prior art date
Application number
PCT/CN2014/093637
Other languages
English (en)
French (fr)
Inventor
闫学松
镡云宇
黄铮
姜燕北
范国峰
李彬
Original Assignee
北京奇虎科技有限公司
奇智软件(北京)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from CN201310687600.5A external-priority patent/CN103699821B/zh
Priority claimed from CN201310685287.1A external-priority patent/CN103702315B/zh
Priority claimed from CN201310685113.5A external-priority patent/CN103702314B/zh
Application filed by 北京奇虎科技有限公司, 奇智软件(北京)有限公司 filed Critical 北京奇虎科技有限公司
Priority to US15/103,396 priority Critical patent/US10078765B2/en
Publication of WO2015085941A1 publication Critical patent/WO2015085941A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/88Detecting or preventing theft or loss
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/126Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/22Processing or transfer of terminal data, e.g. status or physical capabilities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2117User registration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • H04M1/67Preventing unauthorised calls from a telephone set by electronic means
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/50Service provisioning or reconfiguring

Definitions

  • the present invention relates to the field of Internet applications, and in particular, to a method and a device for processing a stolen terminal.
  • the owner can only indicate that the terminal is stolen by means of an alarm, and cannot provide other identifiers to indicate that the terminal is stolen.
  • the terminal is stolen, and only a small group of people such as the owner and the police can know that the terminal is stolen.
  • the present invention has been made in order to provide a processing method and corresponding apparatus for a stolen terminal that overcomes the above problems or at least partially solves the above problems.
  • a method for processing a stolen terminal includes: receiving a status modification message from a sender, wherein the status modification message carries a current status of the terminal; If the message is valid, the state modification message is forwarded to the server, and the server modifies the state information of the terminal stored in the server to the current state according to the state modification message.
  • the present invention also provides a processing client for a stolen terminal, comprising: a receiver configured to receive a status modification message from a sender, wherein the status modification message carries a current status of the terminal; a legal determiner, The device is configured to determine whether the status modification message is legal; the sender is configured to forward the status modification message to the server if the status modification message is legal, and the server may modify the message according to the status modification message.
  • the status information of the terminal stored in the server is modified to the current status.
  • the present invention further provides a server, including: a command receiver, configured to receive a state modification message sent by the terminal, where the state modification message carries a current state of the terminal and identity identification information of the terminal;
  • the state modifier is configured to modify the state information of the terminal stored in the server to the current state according to the state modification message.
  • the status modification message is verified for legality, and the received status modification message is guaranteed to be a valid and reliable command, and the receiving party is prevented from receiving the untrusted or malicious sender.
  • the status modification command sent causes the status information of the terminal to be maliciously modified. If the status information of the terminal is maliciously modified, the server may report the real-time location of the terminal user to the malicious sender, leak the user information to the malicious sender, or may cause the stolen terminal to be removed from the stolen identity, thereby failing to obtain the stolen terminal. Related information, it is impossible to capture the thief according to the information of the stolen terminal.
  • the method provided by the embodiment of the present invention forwards the state modification message to the server, and the server modifies the state information of the terminal stored in the server to the current state according to the state modification message, which solves the prior art.
  • Other issues cannot be provided to indicate whether the terminal has been stolen.
  • the processing method of the stolen terminal provided by the embodiment of the present invention can change the status information of the stolen terminal. For example, after the terminal is stolen, the embodiment of the present invention can change the current state of the terminal to be stolen. If the thief is transacting on the stolen terminal, the buyer can check that the terminal has been stolen, thereby stopping the transaction and providing clues to the thief. Therefore, the use of the embodiment of the invention can achieve the beneficial effect of increasing the probability of the stolen terminal and effectively curbing the theft.
  • a method for processing a stolen terminal comprising: receiving a status modification message from a sender, wherein the status modification message carries identity information of a terminal whose status has changed. And forwarding, by the terminal, the status modification message to the terminal corresponding to the identity information of the terminal, and verifying, by the terminal, the state modification request returned when the status modification message passes, The status information of the terminal is modified.
  • the present invention further provides a server, comprising: a receiver configured to receive a status modification message from a sender, wherein the status modification message carries identity information of a terminal whose status has changed; and the transmitter is configured to Forwarding the status modification message to the terminal corresponding to the identity information of the terminal, and verifying by the terminal; the state modifier is configured to modify the state returned when the status modification message is verified according to the terminal Request to modify the status information of the terminal.
  • the present invention also provides a processing client for a stolen terminal, comprising: a message receiver configured to receive a status modification message forwarded by the server from the sender; and a verifier configured to verify the received status modification message And the request sender is configured to: after the status modification message passes the verification, return a status modification request to the server, and the server modifies the status of the terminal according to the status modification request.
  • the status modification message from the sender is received and forwarded to the corresponding terminal, and the status verification message is verified by the terminal to ensure that the received status modification message is a true and valid message, avoiding Receiving a status modification message sent by an untrusted or malicious sender causes the status information of the terminal to be maliciously modified.
  • the server may report the real-time location of the terminal user to the malicious sender, leak the user information to the malicious sender, or may cause the stolen terminal to be removed from the stolen identity, thereby failing to obtain the stolen terminal.
  • the embodiment of the present invention receives the status modification request returned by the terminal, and modifies the status information of the terminal according to the status modification request, which solves the problem that the other information cannot be provided in the prior art.
  • the problem of being stolen The processing method of the stolen terminal provided by the embodiment of the present invention can change the status information of the stolen terminal. For example, after the terminal is stolen, the embodiment of the present invention can change the current state of the terminal to be stolen. If the thief is transacting on the stolen terminal, the buyer can check that the terminal has been stolen, thereby stopping the transaction and providing clues to the thief. Therefore, the use of the embodiment of the invention can achieve the beneficial effect of increasing the probability of the stolen terminal and effectively curbing the theft.
  • a method for processing a stolen terminal including: receiving a status modification message from a sender, wherein the status modification message carries identity information of the terminal and the terminal The current state of the terminal is used to verify the validity of the status modification message by the server; and the state information of the terminal corresponding to the identity identification information is modified to the current state according to the status modification message verified by the legality.
  • the present invention further provides a server, comprising: a receiver configured to receive a state modification message from a sender, wherein the state modification message carries identity information of the terminal and a current state of the terminal; And configured to determine whether the status modification message passes the validity verification; the status modifier is configured to modify the status information of the terminal corresponding to the identity identification information to the current status according to the status modification message verified by the legality.
  • the status modification message from the sender is received, and the status modification message is verified by the server to ensure that the received status modification message is a true and valid message, and the reception is prevented from being sent from untrusted or malicious.
  • the status modification message sent by the party causes the status information of the terminal to be maliciously modified. If the status information of the terminal is maliciously modified, the server may report the real-time location of the terminal user to the malicious sender, leak the user information to the malicious sender, or may cause the stolen terminal to be removed from the stolen identity, thereby failing to obtain the stolen terminal. Related information, it is impossible to capture the thief according to the information of the stolen terminal.
  • the embodiment of the present invention modifies the status information of the terminal according to the status modification message, and solves the problem that the other identifier cannot be provided in the prior art to indicate whether the terminal is stolen.
  • the processing method of the stolen terminal provided by the embodiment of the present invention can change the status information of the stolen terminal. For example, after the terminal is stolen, the embodiment of the present invention can change the current state of the terminal to be stolen. If the thief is transacting on the stolen terminal, the buyer can check that the terminal has been stolen, thereby stopping the transaction and providing clues to the thief. Therefore, the use of the embodiment of the invention can achieve the beneficial effect of increasing the probability of the stolen terminal and effectively curbing the theft.
  • a computer program comprising computer readable code causing the computing device to perform a stolen terminal according to the present invention when the computer readable code is run on a computing device Approach.
  • a computer readable medium storing a computer program storing a processing method of a stolen terminal according to the present invention is provided.
  • FIG. 1 is a flowchart showing a process of a method for processing a stolen terminal according to an embodiment of the present invention
  • FIG. 2 is a flowchart showing a process of a method for processing a stolen terminal according to still another embodiment of the present invention
  • FIG. 3 is a schematic structural diagram of a processing client of a stolen terminal according to an embodiment of the present invention.
  • FIG. 4 is a schematic structural diagram of a server according to an embodiment of the present invention.
  • FIG. 5 is a flowchart showing a process of a method for processing a stolen terminal according to still another embodiment of the present invention.
  • FIG. 6 is a flowchart showing a process of a method for processing a stolen terminal according to still another embodiment of the present invention.
  • FIG. 7 is a flowchart showing a process of a method for processing a stolen terminal according to still another embodiment of the present invention.
  • FIG. 8 is a schematic structural diagram of a server according to still another embodiment of the present invention.
  • FIG. 9 is a schematic structural diagram of a processing client of a stolen terminal according to still another embodiment of the present invention.
  • FIG. 10 is a flowchart showing a process of a method for processing a stolen terminal according to still another embodiment of the present invention.
  • FIG. 11 is a flowchart showing a process of a method for processing a stolen terminal according to still another embodiment of the present invention.
  • FIG. 12 is a flowchart showing a process of a method for processing a stolen terminal according to still another preferred embodiment of the present invention.
  • FIG. 13 is a flowchart showing a process of a method for processing a stolen terminal according to still another preferred embodiment of the present invention.
  • FIG. 14 is a schematic structural diagram of a server according to still another embodiment of the present invention.
  • Figure 15 is a block diagram schematically showing a computing device for performing a processing method of a stolen terminal according to the present invention
  • Fig. 16 schematically shows a storage unit for holding or carrying program code for implementing a processing method of a stolen terminal according to the present invention.
  • FIG. 1 is a flow chart showing the processing of a stolen terminal processing method according to an embodiment of the present invention. As shown in FIG. 1, the flow includes at least steps S102 to S104.
  • Step S102 Receive a state modification message from the sender, where the state modification message carries the current state of the terminal.
  • Step S104 If the state modification message is valid, the state modification message is forwarded to the server, and the server modifies the state information of the terminal stored in the server to the current state according to the state modification message.
  • the embodiment of the present invention After receiving the status modification message from the sender, the embodiment of the present invention performs the validity verification on the status modification message to ensure that the received status modification message is a true and valid and reliable command, and avoids receiving the sending from the untrusted or malicious sender.
  • the status modification instruction causes the status information of the terminal to be maliciously modified. If the status information of the terminal is maliciously modified, the server may report the real-time location of the terminal user to the malicious sender, leak the user information to the malicious sender, or may cause the stolen terminal to be removed from the stolen identity, thereby failing to obtain the stolen terminal. Related information, it is impossible to capture the thief according to the information of the stolen terminal.
  • the method provided by the embodiment of the present invention forwards the state modification message to the server, and the server modifies the state information of the terminal stored in the server to the current state according to the state modification message, which solves the prior art.
  • Other issues cannot be provided to indicate whether the terminal has been stolen.
  • the processing method of the stolen terminal provided by the embodiment of the present invention can change the status information of the stolen terminal. For example, after the terminal is stolen, the embodiment of the present invention can change the current state of the terminal to be stolen. If the thief is transacting on the stolen terminal, the buyer can check that the terminal has been stolen, thereby stopping the transaction and providing clues to the thief. Therefore, the use of the embodiment of the invention can achieve the beneficial effect of increasing the probability of the stolen terminal and effectively curbing the theft.
  • Step S102 when executed, receives a status modification message from the sender, where the identity of the sender needs to be verified, and if the identity verification of the sender passes, it proves that the status modification message from the sender is legal, and the anti-theft operation can be continued. If the sender's identity verification fails, it proves that the status modification message from the sender is illegal and does not need to continue to perform the anti-theft operation.
  • the identity of the sender can usually be represented by a number, and the sender has a one-to-one correspondence with the number.
  • a list of trusted numbers is usually provided, in which the trusted number of the stolen terminal, such as a friend number, a contract authentication code, etc., is stored. Therefore, when the status modification message is verified for legality, the number representing the sender can be matched with the trusted number stored on the stolen terminal side. If the two match, the sender authentication passes, and the status modification message sent by the sender is legal. If the two do not match, the sender authentication fails, and accordingly, the status modification message sent by the sender is also invalid.
  • the sender can be a terminal capable of issuing commands and having unique identification, such as a mobile terminal such as a mobile phone, each mobile terminal Have a unique phone number for legitimate legal verification, and can send messages or instructions through SMS or network.
  • the embodiment of the present invention After performing the validity verification on the state modification message, the embodiment of the present invention performs different operations according to the verification result. Specifically, if the state modification message does not pass the validity verification, the embodiment of the present invention ignores the state modification message. If the state modification message passes the legality verification, the embodiment of the present invention obtains the identity identification information of the stolen mobile terminal. In the embodiment of the present invention, after obtaining the identity identification information of the terminal, the status modification message carrying the identity identification information is sent to the server.
  • the embodiment of the present invention utilizes The server verifies that the status modification message is legitimate. Specifically, the embodiment of the present invention verifies the validity of the state modification message by determining whether the identity identification information carried in the state modification message matches the identity identification information stored in the server. If the identity information carried in the state modification message matches the identity information stored in the server, the embodiment of the present invention determines that the state modification message is legal. If the identity information carried in the state modification message does not match the identity information stored in the server, the embodiment of the present invention determines that the state modification message is invalid.
  • the embodiment of the present invention performs the next operation according to the judgment result of the validity of the state modification message.
  • the embodiment of the present invention ignores the state modification message.
  • the embodiment of the present invention triggers a state information modification operation in the server. After the server is triggered, the status information of the terminal stored in the server is modified to the current state according to the status modification message.
  • the server after the server modifies the state information of the terminal to the current state, the server returns the modification result to the terminal, and sends the modification result to the sender through the terminal.
  • the modification result is sent to the terminal, and then the terminal forwards the packet to the sender, respectively reminding the terminal and the sender that the current state of the terminal has been modified, thereby causing the terminal and sending.
  • the party can perform the corresponding operation according to the current state of the terminal after modification. For example, when the terminal is a mobile phone, the user sends a status modification message to the stolen mobile phone using the number of friends and relatives bound to the stolen mobile phone, and the marked mobile phone has been stolen.
  • the server modifies the current state of the mobile phone according to the status modification message, if the modified result is returned to the stolen mobile phone and the number of friends and relatives, the stolen mobile phone can determine that the stolen mobile phone is stolen, thereby performing an anti-theft operation, such as locking the mobile phone. Get anti-theft operations such as fingerprints or photos of the thief.
  • the user can know in time that the mobile phone has been tagged and stolen, and further performs other anti-theft operations on the stolen mobile phone.
  • the identity identification information of the terminal may be an International Mobile Equipment Identity (IMEI) of the terminal, and may be a user identity code (Identity, hereinafter referred to as ID) of the terminal, and may also be It is any identifiable information that can uniquely identify the terminal, which is not limited by the embodiment of the present invention.
  • IMEI International Mobile Equipment Identity
  • ID user identity code
  • the embodiment of the present invention provides a terminal identity identifier.
  • the terminal identity is the hardware ID of the terminal.
  • the embodiment of the present invention acquires the hardware ID.
  • the embodiment of the present invention first obtains the IMEI of the terminal, which is recorded as the first character string.
  • the embodiment of the present invention obtains the network card address of the stolen mobile terminal, and removes non-letter and non-numeric characters in the network card address, and the removed network card address is recorded as the second character string.
  • the embodiment of the present invention obtains a serial number of a Central Processing Unit (CPU) of the terminal, which is recorded as a third character string.
  • CPU Central Processing Unit
  • the embodiment of the present invention merges the above three character strings in a predetermined order.
  • the predetermined sequence may be that the three strings are merged in the first, second, and third order, and the three strings may be merged in the third, second, and first reverse order, and may be other reservations.
  • the order of the present invention is not limited thereto.
  • the embodiment of the present invention After merging the above-mentioned character strings, the embodiment of the present invention converts the combined result into an uppercase format and records it as the first result. After obtaining the first result, the embodiment of the present invention continues to perform the first result on the message digest algorithm.
  • the fifth version (Message Digest Algorithm 5, hereinafter referred to as MD5) operates to obtain the second result. Then, the embodiment of the present invention converts the second result into an uppercase format to obtain the hardware ID of the terminal.
  • the hardware ID of the terminal is combined with the IMEI of the terminal, the network card address, and the serial number of the CPU to ensure that the status modification message received by the server is authentic and reliable, and avoids receiving the camouflage from the untrusted or malicious sender.
  • the status modification message sent by the terminal causes the server to incorrectly modify the status information of the terminal. For example, if the untrusted or malicious sender masquerades as the terminal sends a status modification message, the server instructs the server to modify the status information of the terminal from being stolen to being stolen. After the status information of the terminal is modified to be stolen, the criminals can perform processing such as brushing the terminal, which may result in the bad consequences that the owner cannot retrieve the terminal.
  • the embodiment of the present invention matches the hardware ID carried in the received state modification message with the hardware ID stored locally by the server. If the hardware ID matches, the IMEI, the network card address, and the CPU serial number of the terminal can be matched, and the present invention can be determined. The legality of the status modification message received by the embodiment of the invention. After the validity of the status modification message is determined, the status information of the terminal is modified to ensure that the status information of the terminal stored by the server can be updated in time.
  • the current state of the terminal may include that the terminal is stolen, the terminal is not stolen, the terminal is retrieved after being stolen, and the like.
  • the embodiment of the present invention updates the status information of the terminal in time, so that the server can provide the stolen owner with the related information (such as the real-time location of the terminal, the fingerprint of the current user of the terminal, etc.).
  • the relevant clues of the terminal increase the possibility of the owner retrieving the terminal.
  • the embodiment of the present invention timely updates the state of the terminal to be retrieved after being stolen, and the server does not need to waste space and other resource queries and related information of the storage terminal.
  • the current state of the terminal in the embodiment of the present invention may further include other more detailed descriptions, such as the sale purchase status information of the terminal, such as the terminal not being sold, the terminal being used, and the terminal being resold, and may also be the current status of any other terminal.
  • the status information is not limited in this embodiment of the present invention.
  • FIG. 2 is a flowchart of a processing method of a stolen terminal according to a preferred embodiment of the present invention, which is used to support a processing method of any of the stolen terminals, and to explain the processing method of the stolen terminal more clearly and easily. understand.
  • the preferred embodiment includes at least steps S202 through S220.
  • the sender of the state modification message is set as the relative friend number
  • the terminal is set as the stolen terminal.
  • the number of relatives and friends is the number of the stolen mobile phone stolen.
  • Step S202 The relative friend mobile phone sends a status modification message to the stolen mobile phone, and marks the mobile phone from being stolen.
  • the user After the user finds that the mobile phone is stolen, the user sends a short message carrying the state modification message to the stolen mobile phone by using the number of friends and relatives bound to the stolen mobile phone, and requires that the current state of the marked mobile phone is the stolen mobile phone.
  • Step S204 Determine whether the status modification message is legal.
  • step S206 After the stolen mobile phone receives the status modification message sent by the relative friend number, it is determined whether the sender of the status modification message matches the relative friend number stored by the stolen mobile phone. If it fails to match, step S206 is performed. If it can match, step S208 is performed.
  • Step S206 When the stolen mobile phone determines that the status modification message is invalid, the status modification message is ignored.
  • Step S208 When the stolen mobile phone determines that the status modification message is legal, it acquires its own hardware ID.
  • Step S210 Forward the status modification message.
  • step S210 is performed to forward the status modification message carrying the hardware ID acquired through step S208.
  • Step S212 Determine whether the status modification message is legal.
  • the server After receiving the status modification message forwarded by the stolen mobile phone, the server matches the hardware ID of the stolen mobile phone carried in the status modification message and the hardware ID stored locally by the server. If the match fails, the server determines that the status modification message is invalid, and performs step S214. If the matching is successful, the server determines that the status modification message is valid, and performs step S216.
  • Step S214 When the server determines that the status modification message is invalid, the status modification message is ignored.
  • Step S216 When the server determines that the status modification message is legal, the state information of the stolen mobile phone is modified to be the stolen mobile phone.
  • the server modifies the status of the stolen mobile phone to the stolen mobile phone according to the status modification message.
  • the server modifies the status information of the mobile phone to the stolen mobile phone according to the status modification message
  • the server returns the modified result to the stolen mobile phone, so that the stolen mobile phone can know its current status in time.
  • Step S220 Send the modification result to the relative friend number.
  • the modified result is sent to the relative friend number.
  • the relatives and friends number receives the modification of the status information of the stolen mobile phone, the user can know that the server has identified the stolen mobile phone.
  • the processing method of the stolen terminal provided by the foregoing preferred embodiments is based on the same inventive concept.
  • the embodiment of the present invention provides a processing client of the stolen terminal, which is used to implement the processing method of the stolen terminal.
  • FIG. 3 is a schematic diagram showing the structure of a processing client of a stolen terminal according to an embodiment of the present invention.
  • the processing client of the stolen terminal in the embodiment of the present invention includes at least a receiver 310, a legal determiner 320, and a transmitter 330.
  • the receiver 310 is configured to receive a status modification message from the sender, where the status modification message carries the current status of the terminal.
  • the legal determiner 320 is coupled to the receiver 310 and configured to determine whether the status modification message is legal.
  • the transmitter 330 is coupled to the receiver 310 and the legal determiner 320 respectively, and configured to forward the state modification message to the server when the state modification message is legal, and the server changes the state information of the terminal stored in the server according to the state modification message. Change to the current state.
  • the embodiment of the present invention After receiving the state modification message from the sender, the embodiment of the present invention performs legality verification on the state modification message to ensure that the received state modification message is a true and valid trusted command, and avoids receiving the untrusted or malicious transmission.
  • the status modification command sent by the sender causes the status information of the terminal to be maliciously modified. If the status information of the terminal is maliciously modified, the server may report the real-time location of the terminal user to the malicious sender, leak the user information to the malicious sender, or may cause the stolen terminal to be removed from the stolen identity, thereby failing to obtain the stolen terminal. Related information, it is impossible to capture the thief according to the information of the stolen terminal.
  • the embodiment of the present invention forwards the state modification message to the server, and the server modifies the state information of the terminal stored in the server to the current state according to the state modification message, which solves the problem that the prior art cannot provide Other identifiers indicate whether the terminal has been stolen.
  • the processing client of the stolen terminal provided by the embodiment of the present invention can change the status information of the stolen terminal. For example, after the terminal is stolen, the embodiment of the present invention can change the current state of the terminal to be stolen. If the thief is transacting on the stolen terminal, the buyer can check that the terminal has been stolen, thereby stopping the transaction and providing clues to the thief. Therefore, the use of the embodiment of the invention can achieve the beneficial effect of increasing the probability of the stolen terminal and effectively curbing the theft.
  • the receiver 310 in the client receives the status modification message from the sender, and the identity of the sender needs to be verified by the legal determiner 320. If the identifier is verified by the legal determiner 320, the sender of the status modification message is If the trusted number stored in the terminal matches, the status modification message can be verified by the legality, and the anti-theft operation can be continued; if the legal determiner 320 verifies, the sender of the status modification message does not match the trusted number stored in the terminal, Need to continue to perform anti-theft operations.
  • the identity of the sender can usually be represented by a number, and the sender has a one-to-one correspondence with the number.
  • a list of trusted numbers is usually provided, in which the trusted number of the stolen terminal, such as a friend number, a contract authentication code, etc., is stored. Therefore, when the status modification message is verified for legality, the number representing the sender can be matched with the trusted number stored on the stolen terminal side. If the two match, the sender authentication passes, and the status modification message sent by the sender is legal. If the two do not match, the sender authentication fails, and accordingly, the status modification message sent by the sender is also invalid.
  • the client If the status modification message is invalid by the verification by the legal determiner 320, the client as shown in FIG. 3 ignores the status modification message. If the status modification message is valid after the verification by the legal determiner 320, the legal determiner 320 triggers the sender 330, and the transmitter 330 acquires the identity identification information of the terminal. After obtaining the identity information, the sender 330 sends a status modification message carrying the identity information to the server.
  • the server After receiving the status modification message carrying the identity information of the terminal, the server verifies whether the status modification message is legal. Specifically, the server verifies the validity of the status modification message by determining whether the identity identification information carried in the status modification message matches the identity information stored locally by the server. If the identity identification information carried in the status modification message matches the identity identification information stored in the server, the status modification message is determined to be legal. If the identity information carried in the status modification message does not match the identity information stored in the server, it is determined that the status modification message is invalid. When the server determines that the status modification message is invalid, the server ignores the status modification message. When the server determines that the status modification message is valid, the server modifies the status information of the locally stored terminal according to the status modification message, and returns the modification result.
  • the receiver 310 in the client shown in FIG. 3 triggers the sending after receiving the modification result returned by the server.
  • the transmitter 330 forwards the modification result to the sender of the status modification message by the transmitter 330.
  • the modification result is sent to the client as shown in FIG. 3, and then the client forwards to the sender, respectively reminding the terminal and the sender of the current state of the terminal. It has been modified to enable the sender to perform the corresponding operation according to the current state of the terminal after modification. For example, when the terminal is a mobile phone, the user sends a status modification message to the stolen mobile phone using the number of friends and relatives bound to the stolen mobile phone, and the marked mobile phone has been stolen.
  • the server modifies the current state of the mobile phone according to the status modification message, if the modified result is returned to the relative friend number, the user can know in time that the mobile phone has been tagged and stolen, and further performs other anti-theft operations on the stolen mobile phone.
  • the identifier information of the terminal may be the IMEI of the terminal, and may be the user ID of the terminal, and may be any identifier information that can uniquely identify the terminal, which is not limited by the embodiment of the present invention.
  • the embodiment of the present invention provides a terminal identity identifier.
  • the terminal identity is the hardware ID of the terminal.
  • the transmitter 330 acquires the hardware ID as the identity identification information of the terminal.
  • the transmitter 330 triggers the calculator 340, which calculates the hardware ID of the terminal. Specifically, the calculator 340 first acquires the IMEI of the terminal, which is recorded as the first character string. Next, the calculator 340 obtains the network card address of the stolen mobile terminal, and removes non-alphabetic and non-numeric characters in the network card address, and the removed network card address is recorded as the second character string.
  • the calculator 340 After acquiring the first character string and the second character string, the calculator 340 acquires the CPU serial number of the terminal and records it as the third character string. After acquiring the first, second, and third character strings, the calculator 340 merges the above three character strings in a predetermined order.
  • the predetermined sequence may be that the three strings are merged in the first, second, and third order, and the three strings may be merged in the third, second, and first reverse order, and may be other reservations.
  • the order of the present invention is not limited thereto.
  • the calculator 340 After merging the above strings, the calculator 340 converts the combined results into an uppercase format and records them as the first result. After obtaining the first result, the calculator 340 performs an MD5 operation on the first result to obtain a second result. Thereafter, the calculator 340 converts the second result into an uppercase format to obtain the hardware ID of the terminal.
  • the hardware ID of the terminal is combined with the IMEI of the terminal, the network card address, and the serial number of the CPU to ensure that the status modification message received by the server is authentic and reliable, and avoids receiving the camouflage from the untrusted or malicious sender.
  • the status modification message sent by the terminal causes the server to incorrectly modify the status information of the terminal. For example, if the untrusted or malicious sender masquerades as the terminal sends a status modification message, the server instructs the server to modify the status information of the terminal from being stolen to being stolen. After the status information of the terminal is modified to be stolen, the criminals can perform processing such as brushing the terminal, which may result in the bad consequences that the owner cannot retrieve the terminal.
  • the embodiment of the present invention matches the hardware ID carried in the received state modification message with the hardware ID stored locally by the server. If the hardware ID matches, the IMEI, the network card address, and the CPU serial number of the terminal can be matched, and the present invention can be determined. The legality of the status modification message received by the embodiment of the invention. After the validity of the status modification message is determined, the status information of the terminal is modified to ensure that the status information of the terminal stored by the server can be updated in time.
  • the current state of the terminal may include that the terminal is stolen, the terminal is not stolen, the terminal is retrieved after being stolen, and the like.
  • the embodiment of the present invention updates the status information of the terminal in time to After receiving the relevant information of the terminal (such as the real-time location of the terminal, the fingerprint of the current user of the terminal, etc.), the server can provide the owner with relevant clues of the stolen terminal, thereby increasing the possibility of the owner retrieving the terminal.
  • the embodiment of the present invention timely updates the state of the terminal to be retrieved after being stolen, and the server does not need to waste space and other resource queries and related information of the storage terminal.
  • the current state of the terminal in the embodiment of the present invention may further include other more detailed descriptions, such as the sale purchase status information of the terminal, such as the terminal not being sold, the terminal being used, and the terminal being resold, and may also be the current status of any other terminal.
  • the status information is not limited in this embodiment of the present invention.
  • the processing client of the stolen terminal (see Figure 3) is capable of receiving a status modification message from the sender and verifying it.
  • the status modification message is forwarded to the server when the verification passes. That is, in this embodiment, the function of the processing client of the stolen terminal is to verify the validity of the status modification message.
  • the processing method and the client of the stolen terminal provided by the foregoing preferred embodiments are based on the same inventive concept.
  • the embodiment of the present invention provides a server for implementing the processing method of the stolen terminal.
  • FIG. 4 shows a schematic structural diagram of a server according to an embodiment of the present invention.
  • the server of the embodiment of the present invention includes at least a command receiver 410 and a state modifier 430.
  • the command receiver 410 is configured to receive a state modification message sent by the terminal, where the state modification message carries the current state of the terminal and the identity identification information of the terminal;
  • the state modifier 430 is coupled to the command receiver 410 and configured to modify the state information of the terminal stored in the server to the current state according to the state modification message.
  • the state modification message is forwarded to the server, and the server modifies the state information of the terminal stored in the server to the current state according to the state modification message, which solves the problem that the terminal cannot provide other identifiers in the prior art to indicate whether the terminal is stolen.
  • the processing method of the stolen terminal provided by the embodiment of the present invention can change the status information of the stolen terminal. For example, after the terminal is stolen, the embodiment of the present invention can change the current state of the terminal to be stolen. If the thief is transacting on the stolen terminal, the buyer can check that the terminal has been stolen, thereby stopping the transaction and providing clues to the thief. Therefore, the use of the embodiment of the invention can achieve the beneficial effect of increasing the probability of the stolen terminal and effectively curbing the theft.
  • the state modifier 430 modifies the state information of the locally stored terminal according to the state modification message.
  • the embodiment of the present invention adds a determiner 420 as shown in FIG. 4 to the server.
  • the determiner 420 determines whether the status modification message is legitimate. Specifically, the determiner 420 verifies the validity of the state modification message by determining whether the identity identification information carried in the state modification message matches the identity identification information stored in the server. If the identity identification information carried in the status modification message matches the identity identification information stored in the server, the determiner 420 determines that the status modification message is legal. If the identity identification information carried in the status modification message does not match the identity identification information stored in the server, the determiner 420 determines that the status modification message is invalid.
  • the identity identification information of the terminal may be an IMEI of the terminal, and may be a user ID of the terminal. It can also be any identity information that can uniquely identify the terminal, which is not limited by the embodiment of the present invention.
  • the embodiment of the present invention provides a terminal identity identifier.
  • the terminal identity is the hardware ID of the terminal.
  • the status modifier 430 After the determiner 420 determines the validity of the status modification message, the status modifier 430 is triggered. The state modifier 430 performs the next operation in accordance with the judgment result of the determiner 420. When the status modification message is not valid, the status modifier 430 ignores the status modification message. When the state modification message is legal, the state modifier 430 modifies the state information of the terminal stored in the server to the current state according to the state modification message.
  • the result transmitter 440 transmits the modification result to the terminal.
  • the result sender 440 sends the modification result to the terminal, and the terminal sends the modification result to the sender to remind the current state of the sender terminal.
  • the sender can perform the corresponding operation according to the current state of the terminal.
  • the current state of the terminal may include that the terminal is stolen, the terminal is not stolen, the terminal is retrieved after being stolen, and the like.
  • the state modifier 430 in the client updates the state information of the terminal in time, so that the server can receive information about the terminal (such as the real-time location of the terminal, the fingerprint of the current user of the terminal, etc.). The owner provides relevant clues about the stolen terminal and increases the possibility of the owner retrieving the terminal.
  • the state modifier 430 promptly updates the state of the terminal to be retrieved after being stolen, and the server does not need to waste space and other resource queries and related information of the storage terminal.
  • the current state of the terminal in the embodiment of the present invention may further include other more detailed descriptions, such as the sale purchase status information of the terminal, such as the terminal not being sold, the terminal being used, and the terminal being resold, and may also be the current status of any other terminal.
  • the status information is not limited in this embodiment of the present invention.
  • the server receives the state modification message verified by the terminal and modifies it. That is, in the embodiment of the present invention, the function of the server is to modify the state information of the locally stored terminal. Of course, for added security, the status modification message can be further verified.
  • the embodiment of the present invention can achieve the following beneficial effects:
  • the embodiment of the present invention After receiving the status modification message from the sender, the embodiment of the present invention performs the validity verification on the status modification message to ensure that the received status modification message is a true and valid and reliable command, and avoids receiving the sending from the untrusted or malicious sender.
  • the status modification instruction causes the status information of the terminal to be maliciously modified. If the status information of the terminal is maliciously modified, the server may report the real-time location of the terminal user to the malicious sender, leak the user information to the malicious sender, or may cause the stolen terminal to be removed from the stolen identity, thereby failing to obtain the stolen terminal. Related information, it is impossible to capture the thief according to the information of the stolen terminal.
  • the method provided by the embodiment of the present invention forwards the state modification message to the server, and the server modifies the state information of the terminal stored in the server to the current state according to the state modification message, which solves the prior art.
  • Other issues cannot be provided to indicate whether the terminal has been stolen.
  • the processing method of the stolen terminal provided by the embodiment of the present invention can change the status information of the stolen terminal. For example, after the terminal is stolen, the embodiment of the present invention can change the current state of the terminal to be stolen. If the thief trades the stolen terminal, the buyer can check that the terminal is stolen, and then stop the transaction and provide The clue of the thief. Therefore, the use of the embodiment of the invention can achieve the beneficial effect of increasing the probability of the stolen terminal and effectively curbing the theft.
  • FIG. 5 shows a process flow diagram of a method of processing a stolen terminal in accordance with one embodiment of the present invention. As shown in FIG. 5, the flow includes at least steps S502 to S506.
  • Step S502 Receive a state modification message from the sender, where the state modification message carries the identity identification information of the terminal whose state has changed.
  • Step S504 Forward the status modification message to the terminal corresponding to the identity identification information of the terminal, and verify the terminal by the terminal.
  • Step S506 Modify the state modification request returned by the message according to the terminal verification state, and modify the state information of the terminal.
  • the embodiment of the present invention receives the status modification message from the sender and forwards it to the corresponding terminal, and the terminal verifies the status modification message to ensure that the received status modification message is a true and valid message, and avoids receiving the message from A status modification message sent by an untrusted or malicious sender causes the status information of the terminal to be maliciously modified. If the status information of the terminal is maliciously modified, the server may report the real-time location of the terminal user to the malicious sender, leak the user information to the malicious sender, or may cause the stolen terminal to be removed from the stolen identity, thereby failing to obtain the stolen terminal. Related information, it is impossible to capture the thief according to the information of the stolen terminal.
  • the embodiment of the present invention receives the status modification request returned by the terminal, and modifies the status information of the terminal according to the status modification request, which solves the problem that the other information cannot be provided in the prior art to indicate whether the terminal is stolen. problem.
  • the processing method of the stolen terminal provided by the embodiment of the present invention can change the status information of the stolen terminal. For example, after the terminal is stolen, the embodiment of the present invention can change the current state of the terminal to be stolen. If the thief is transacting on the stolen terminal, the buyer can check that the terminal has been stolen, thereby stopping the transaction and providing clues to the thief. Therefore, the use of the embodiment of the invention can achieve the beneficial effect of increasing the probability of the stolen terminal and effectively curbing the theft.
  • Step S502 when executed, receives a status modification message from a sender, where the status modification message carries identity information of a terminal whose status has changed.
  • the embodiment of the present invention verifies the received state modification message. If the status modification message passes the verification, the anti-theft operation can be continued; if the status modification message fails the verification, the anti-theft operation does not need to be continued.
  • the status modification message carries the identity identification information of the terminal, and the identity identification information of each terminal stored in the server. If the identity information of the terminal carried in the state modification message matches the identity information of the terminal stored in the server, the state modification message is verified by the legality, and the step S504 is performed as shown in FIG. The modification message is forwarded to the terminal corresponding to the identity information. If the message is not matched, the state modification message does not pass the validity verification. Correspondingly, the embodiment of the present invention ignores the state modification message and does not perform any operation.
  • the terminal After the state modification message is forwarded to the corresponding terminal, the terminal cannot guarantee to forward the state.
  • the server that modifies the message is a reliable server. Further, the verification of the state modification message on the server side cannot be trusted.
  • the terminal performs the validity verification on the received status modification message again.
  • the embodiment of the present invention determines whether the identification information of the terminal carried in the status modification message matches the identity information stored locally by the terminal. If the match is made, the status modification message is legal. If it does not match, the status modification message is invalid.
  • the terminal performs different operations. Specifically, if the status modification message is invalid, the status modification message is ignored. If the status modification message is legal, the terminal acquires its own ID and returns a status modification request carrying the hardware ID.
  • the embodiment of the present invention After receiving the state modification request, the embodiment of the present invention performs legality verification on the state modification request according to the hardware ID carried in the state modification request. Specifically, when the hardware ID carried in the state modification request and the hardware ID stored locally by the server can match, the state modification request is verified by legality; if the matching cannot be performed, the state modification request cannot pass the legality verification. If the state modification request fails to pass the legality verification, the embodiment of the present invention ignores the state modification request and does not perform any operation. If the state modification request is verified by the legality, the embodiment of the present invention uses the server to modify the state information of the terminal to ensure that the state information of the terminal stored in the server can be updated to the current state of the terminal in time.
  • the two legality verifications of the state modification message are all performed by the identity of the terminal, and the verification of the state modification request is used to improve the security, and the received state modification request is determined to be a legal state modification request.
  • the embodiment of the invention verifies the validity of the state modification request by using the hardware ID of the terminal.
  • the identity information of the terminal may be the IMEI of the terminal, and may be the user ID of the terminal, and may be any identifier information that can uniquely identify the terminal, which is not limited in this embodiment of the present invention.
  • the hardware ID of the terminal is comprehensive identity information that aggregates multiple terminal identity information.
  • the acquisition of the hardware ID is now described in detail. As described above, if the state modification message is legal, the embodiment of the present invention obtains the hardware ID of the terminal.
  • the acquisition manner of the hardware ID is the same as the acquisition manner in the first embodiment.
  • the hardware ID of the terminal is combined with the IMEI of the terminal, the network card address, and the serial number of the CPU to ensure that the status modification message received by the server is authentic and reliable, and avoids receiving the camouflage from the untrusted or malicious sender.
  • the status modification message sent by the terminal causes the server to incorrectly modify the status information of the terminal. For example, if the untrusted or malicious sender masquerades as the terminal sends a status modification message, the server instructs the server to modify the status information of the terminal from being stolen to being stolen. After the status information of the terminal is modified to be stolen, the criminals can perform processing such as brushing the terminal, which may result in the bad consequences that the owner cannot retrieve the terminal.
  • the embodiment of the present invention matches the hardware ID carried in the received state modification message with the hardware ID stored locally by the server. If the hardware ID matches, the IMEI, the network card address, and the CPU serial number of the terminal can be matched, and the present invention can be determined. The legality of the status modification message received by the embodiment of the invention. After the validity of the status modification message is determined, the status information of the terminal is modified to ensure that the status information of the terminal stored by the server can be updated in time.
  • modifying the status information of the terminal may include modifying the status information of the terminal to be stolen, not stolen, or retrieved after the terminal is stolen, and the like.
  • the embodiment of the present invention enters the status information of the terminal.
  • the line is modified in time, so that after receiving the relevant information of the terminal (such as the real-time location of the terminal, the fingerprint of the current user of the terminal, etc.), the server can provide the relevant clues of the stolen terminal to the owner, and increase the possibility of the owner retrieving the terminal.
  • the embodiment of the present invention modifies the state information of the terminal in time to be retrieved after being stolen, and the server does not need to waste space and other resource query and related information of the storage terminal.
  • the status information of the terminal in the embodiment of the present invention may further include other more detailed descriptions, such as the sale purchase status information of the terminal, such as the terminal not being sold, the terminal being used, and the terminal being resold, and may also be the current status of any other terminal.
  • the status information is not limited in this embodiment of the present invention.
  • the embodiment of the present invention may return the modification result to the sender of the state modification message.
  • the modification result is sent to the sender, and the current state of the sender terminal is modified, so that the sender can perform the corresponding operation according to the current state after the terminal is modified.
  • the terminal is a mobile phone
  • the user sends a status modification message to the stolen mobile phone using the number of friends and relatives bound to the stolen mobile phone, and the marked mobile phone has been stolen.
  • the server modifies the current state of the mobile phone according to the status modification message, if the modified result is returned to the relative friend number, the user can know in time that the mobile phone has been tagged and stolen, and further performs other anti-theft operations on the stolen mobile phone.
  • the embodiment of the present invention may further generate a task ID for performing a modification operation after the status modification message passes the validity verification, and send the task ID to the status modification message sender.
  • the sender determines that the state modification message has been verified by the validity of the server.
  • the sender can send a query request carrying the task ID to the server at any time to query the execution of the modification operation of the server.
  • the server determines the execution status of the current modification operation according to the task ID carried in the query request, and returns to the sender. For example, when the terminal is a mobile phone, if the mobile phone is lost, the user can send a status modification message to the server and receive the task ID returned by the server.
  • the user can query the execution status of the server's state modification operation at any time. If the current modification operation cannot be performed due to a server failure or the like, the user can know the relevant information that cannot be executed in time, and take corresponding measures according to the learned related information to protect the security of the stolen mobile phone more efficiently.
  • the sender of the state modification message may be set in a mobile terminal, such as a mobile phone, a laptop computer, etc., and send a state modification message in the form of a short message or a network.
  • the sender in the embodiment of the present invention may also be disposed in a terminal, such as a computer, and send the status modification message in the form of a network.
  • the state information of the terminal can be modified in time. For example, after the terminal is stolen, the user can send a status modification message through various messaging platforms to ensure that the terminal is stolen in time. Further, the related information of the stolen terminal can be known in time, and the probability of the stolen terminal being recovered is increased.
  • FIG. 6 is a flowchart of a processing method of a stolen terminal according to a preferred embodiment of the present invention, which is used to support a processing method of any of the stolen terminals, and the processing method of the stolen terminal is more clearly explained. understand.
  • the preferred embodiment includes at least steps S602 through S628.
  • the sender of the state modification message is set to the mobile phone of the relatives and friends, and the terminal is set as the stolen terminal.
  • friends and relatives mobile phones are stolen The phone where the phone number of the friend and friend is bound.
  • Step S602 Send a status modification message to mark that the mobile phone is stolen.
  • the user After the mobile phone is stolen, the user sends a status modification message to the server through the network using the mobile phone of the relatives and friends, and the mobile phone is stolen.
  • Step S604 Determine whether the state modification request is legal.
  • the server determines whether the status modification message is legal. If yes, go to step S608, if no, go to step S606.
  • step S606 the status modification message is invalid, and the status modification message is ignored.
  • Step S608 sending the task ID to the mobile phone of the relatives and friends.
  • the server After the server determines that the state modification message is legal, the server generates a task ID for performing the modification operation, and sends the task ID to the family and friends mobile phone through the network.
  • Step S610 Forward the status modification message.
  • Step S612 Determine whether the status modification message is legal.
  • step S614 After the server verifies that the received status modification message is valid, it forwards the status modification message to the stolen mobile phone. After the stolen mobile phone receives the status modification message, the status modification message is again verified for legality. If the status modification message does not pass the legality verification, step S614 is performed, and if the verification is passed, step S616 is performed.
  • Step S614 When the status modification message fails the validity verification, the status modification message is ignored.
  • Step S616 When the status modification message is verified by legality, the stolen mobile phone obtains its own hardware ID.
  • Step S618 Send a status modification request to the server.
  • the stolen mobile phone After the stolen mobile phone obtains its own hardware ID, it sends a status modification request carrying the hardware ID to the server.
  • Step S620 Determine whether the state modification request is legal.
  • the server After receiving the status modification request, the server determines whether the status modification request is legal according to the hardware ID carried in the status modification request. If it is not legal, step S622 is performed, and if it is legal, step S624 is performed.
  • Step S622 When the state modification request is invalid, the server ignores the state modification request.
  • Step S624 When the state modification request is legal, the modification state information operation is performed.
  • the mobile phone of the relatives and friends After receiving the task ID sent by the server, the mobile phone of the relatives and friends can send a query request carrying the task ID to the server through the network, and query the execution status of the modification operation of the server.
  • Step S628, sending a modified execution to the mobile phone of the relatives and friends.
  • the server After receiving the query request sent by the mobile phone of the relatives and friends, the server obtains the execution status of the current modification operation according to the task ID carried in the query request, and returns the execution status to the mobile phone of the relatives and friends through the network.
  • FIG. 7 is a flowchart of a processing method of a stolen terminal according to another preferred embodiment of the present invention, which is used to support a processing method of any of the stolen terminals, and to explain the processing method of the stolen terminal more clearly. Easy to understand.
  • the preferred embodiment includes at least steps S702 through S724.
  • the state will be
  • the sender of the modified message is set to the mobile phone of the relatives and friends, and the terminal is set as the stolen terminal.
  • the mobile phone of the relatives and friends of the relatives and friends is the mobile phone number of the family and friends.
  • Step S702 Send a status modification message to mark that the mobile phone is stolen.
  • the user uses the short message to send a status modification message to the server, and the mobile phone is stolen.
  • Step S704 Determine whether the state modification request is legal.
  • the server determines whether the status modification message is legal. If yes, go to step S708, if no, go to step S706.
  • step S706 the status modification message is invalid, and the status modification message is ignored.
  • Step S708 Forward the status modification message.
  • Step S710 Determine whether the status modification message is legal.
  • step S712 is performed, and if the verification is passed, step S714 is performed.
  • Step S712 When the status modification message fails the legality verification, the status modification message is ignored.
  • Step S714 When the status modification message is verified by legality, the stolen mobile phone acquires its own hardware ID.
  • Step S716 sending a status modification request to the server.
  • the stolen mobile phone After the stolen mobile phone obtains its own hardware ID, it sends a status modification request carrying the hardware ID to the server.
  • Step S718 Determine whether the state modification request is legal.
  • the server After receiving the status modification request, the server determines whether the status modification request is legal according to the hardware ID carried in the status modification request. If it is not legal, step S720 is performed, and if it is legal, step S722 is performed.
  • Step S720 When the state modification request is invalid, the server ignores the state modification request.
  • Step S722 When the state modification request is legal, the modification state information operation is performed.
  • step S724 the execution status is modified by the short message to the mobile phone of the relatives and friends.
  • the embodiment of the present invention provides a server for implementing the processing method of the stolen terminal.
  • FIG. 8 shows a schematic structural diagram of a server according to an embodiment of the present invention.
  • the server of the embodiment of the present invention includes at least a receiver 810, a transmitter 830, and a state modifier 840.
  • the receiver 810 is configured to receive a status modification message from the sender, where the status modification message carries the identity information of the terminal whose status has changed.
  • the transmitter 830 is coupled to the receiver 810 and configured to forward the state modification message to the terminal corresponding to the identity information of the terminal, and the terminal verifies the message.
  • the state modifier 840 is coupled to the receiver 810 and configured to modify the message according to the terminal verification status.
  • the status modification request is returned, and the status information of the terminal is modified.
  • the embodiment of the present invention receives the status modification message from the sender and forwards it to the corresponding terminal, and the terminal verifies the status modification message to ensure that the received status modification message is a true and valid message, and avoids receiving the message from A status modification message sent by an untrusted or malicious sender causes the status information of the terminal to be maliciously modified. If the status information of the terminal is maliciously modified, the server may report the real-time location of the terminal user to the malicious sender, leak the user information to the malicious sender, or may cause the stolen terminal to be removed from the stolen identity, thereby failing to obtain the stolen terminal. Related information, it is impossible to capture the thief according to the information of the stolen terminal.
  • the embodiment of the present invention receives the status modification request returned by the terminal, and modifies the status information of the terminal according to the status modification request, which solves the problem that the other information cannot be provided in the prior art to indicate whether the terminal is stolen. problem.
  • the processing method of the stolen terminal provided by the embodiment of the present invention can change the status information of the stolen terminal. For example, after the terminal is stolen, the embodiment of the present invention can change the current state of the terminal to be stolen. If the thief is transacting on the stolen terminal, the buyer can check that the terminal has been stolen, thereby stopping the transaction and providing clues to the thief. Therefore, the use of the embodiment of the invention can achieve the beneficial effect of increasing the probability of the stolen terminal and effectively curbing the theft.
  • the receiver 810 in the server shown in FIG. 8 receives the status modification message from the sender, where the status modification message carries the identity information of the terminal whose status has changed.
  • the determiner 820 in the server performs legality judgment on the received state modification message. If the status modification message is valid after the judgment of the determiner 820, the anti-theft operation is continued; if the status modification message is invalid after the judgment of the determiner 820, the anti-theft operation does not need to be continued.
  • the status modification message carries the identity identification information of the terminal, and the identity identification information of each terminal stored in the server. If the identity information of the terminal carried in the state modification message matches the identity information of the terminal stored in the server, the determiner 820 determines that the state modification message passes the legality verification, and the transmitter 830 forwards the state modification message to the foregoing. If the terminal does not match, the determiner 820 determines that the status modification message has not passed the legality verification. Correspondingly, the server ignores the status modification message and does not perform any operation.
  • the terminal After the status modification message is sent to the terminal, the terminal performs legality verification on the status modification message. If the status modification message is verified by non-legality, the terminal ignores the status modification message. If the status modification message passes the validity verification, the terminal acquires its own hardware ID, and sends a status modification request carrying the hardware ID to the server as shown in FIG. 4.
  • the receiver 810 in the server after receiving the status modification request, triggers the determiner 820.
  • the determiner 820 determines whether the status modification request is legal. In the embodiment of the present invention, the determiner 820 determines whether the state modification request is legal by determining whether the hardware ID carried in the state modification request matches the hardware ID stored locally by the server. If the hardware ID carried in the state modification request does not match the hardware ID stored locally by the server, the determiner 820 determines that the state modification request is invalid, and the server ignores the state modification request. If the hardware ID carried in the state modification request matches the hardware ID stored locally by the server, the determiner 820 determines that the state modification request is legal and triggers the state modifier 840 coupled thereto.
  • the state modifier 840 modifies the state information of the terminal according to the state modification request.
  • modifying the state information of the terminal by the state modifier 840 may include modifying the state information of the terminal to be stolen, not stolen, or retrieved after the terminal is stolen, and the like.
  • the state modifier 840 in the server modifies the state information of the terminal in time, so that the server can receive the related information of the terminal (such as the real-time location of the terminal, the fingerprint of the current user of the terminal, etc.) Provide relevant clues about the stolen terminal and increase the possibility of the owner retrieving the terminal.
  • the state modifier 840 in the server promptly modifies the state information of the terminal to be retrieved after being stolen, and the server does not need to waste space and other resource queries and related information of the storage terminal.
  • the status information of the terminal in the embodiment of the present invention may further include other more detailed descriptions, such as the sale purchase status information of the terminal, such as the terminal not being sold, the terminal being used, and the terminal being resold, and may also be the current status of any other terminal.
  • the status information is not limited in this embodiment of the present invention.
  • the transmitter 830 is triggered.
  • Transmitter 830 can return the modification result to the sender of the status modification message.
  • the sender 830 sends the modification result to the sender, and reminds the sender that the current state of the terminal has been modified, so that the sender can perform the corresponding operation according to the modified current state of the terminal. For example, when the terminal is a mobile phone, the user sends a status modification message to the stolen mobile phone using the number of friends and relatives bound to the stolen mobile phone, and the marked mobile phone has been stolen.
  • the server modifies the current state of the mobile phone according to the status modification message, if the modified result is returned to the relative friend number, the user can know in time that the mobile phone has been tagged and stolen, and further performs other anti-theft operations on the stolen mobile phone.
  • the embodiment of the present invention may further generate a task ID for performing a modification operation after the determiner 820 determines that the state modification message passes the legality verification, and the receiver 810 sends the task ID to the state modification message sender.
  • the sender determines that the state modification message has been verified by the validity of the server.
  • the sender can send a query request carrying the task ID to the server at any time to query the execution of the modification operation of the server.
  • the receiver 810 in the server determines the execution status of the current modification operation according to the task ID carried in the query request, and triggers the sender 830 to return the execution of the modification operation to the sender.
  • the terminal when the terminal is a mobile phone, if the mobile phone is lost, the user can send a status modification message to the server and receive the task ID returned by the server. According to the task ID, the user can query the execution status of the server's state modification operation at any time. If the current modification operation cannot be performed due to a server failure or the like, the user can know the relevant information that cannot be executed in time, and take corresponding measures according to the learned related information to protect the security of the stolen mobile phone more efficiently.
  • the server receives a status modification message from the sender and forwards it to the corresponding terminal for authentication.
  • the terminal sends a status modification request to the server, which is modified by the server. That is, in the embodiment of the present invention, the function of the server is to forward the state modification message, and the state information of the locally stored terminal is modified according to the corresponding request after the verification is passed.
  • the status modification message can be further verified.
  • the processing method and the server of the stolen terminal provided by the foregoing preferred embodiments are based on the unified inventive concept.
  • the embodiment of the present invention provides a processing client of the stolen terminal, which is used to implement the processing method of the stolen terminal.
  • FIG. 9 is a block diagram showing the structure of a processing client of a stolen terminal according to an embodiment of the present invention.
  • the processing client of the stolen terminal in the embodiment of the present invention at least includes: a message receiver 910, a verifier 920, and a request The transmitter 930 is sought.
  • the message receiver 910 is configured to receive a status modification message from the sender forwarded by the server.
  • a validator 920 coupled to the message receiver 910, is configured to verify the received status modification message.
  • the request sender 930 is coupled to the verifier 920 and configured to return the status modification request to the server after the status modification message is verified.
  • the server modifies the status of the terminal according to the status modification request.
  • the embodiment of the present invention receives the status modification message from the sender and forwards it to the corresponding terminal, and the terminal verifies the status modification message to ensure that the received status modification message is a true and valid message, and avoids receiving the message from A status modification message sent by an untrusted or malicious sender causes the status information of the terminal to be maliciously modified. If the status information of the terminal is maliciously modified, the server may report the real-time location of the terminal user to the malicious sender, leak the user information to the malicious sender, or may cause the stolen terminal to be removed from the stolen identity, thereby failing to obtain the stolen terminal. Related information, it is impossible to capture the thief according to the information of the stolen terminal.
  • the embodiment of the present invention receives the status modification request returned by the terminal, and modifies the status information of the terminal according to the status modification request, which solves the problem that the other information cannot be provided in the prior art to indicate whether the terminal is stolen. problem.
  • the processing method of the stolen terminal provided by the embodiment of the present invention can change the status information of the stolen terminal. For example, after the terminal is stolen, the embodiment of the present invention can change the current state of the terminal to be stolen. If the thief is transacting on the stolen terminal, the buyer can check that the terminal has been stolen, thereby stopping the transaction and providing clues to the thief. Therefore, the use of the embodiment of the invention can achieve the beneficial effect of increasing the probability of the stolen terminal and effectively curbing the theft.
  • the message receiver 910 in the client shown in FIG. 9 triggers the verifier 920 after receiving the status modification message forwarded by the server from the sender.
  • the verifier 920 performs legality verification on the status modification message according to the identity identification information of the terminal carried in the status modification message. If the identity information of the terminal carried in the state modification message matches the identity information stored locally by the terminal, the state modification message is legal. If the verification by the authenticator 920 does not match the identity information of the terminal carried in the state modification message and the identity information stored locally by the terminal, the state modification message is invalid.
  • the verifier 920 verifies whether the status modification message received by the message receiver 910 is legal, and performs the next operation according to the verification result. Specifically, if the status modification message is invalid, the client as shown in FIG. 9 ignores the status modification message and does not perform any operation. If the status modification message is valid, the verifier 920 triggers the request transmitter 930.
  • the request sender 930 acquires the hardware ID of the terminal and sends a status modification request carrying the hardware ID to the server.
  • the request sender 930 obtains the hardware ID of the terminal from the calculator 940 coupled thereto before transmitting the status modification request to the server.
  • the acquisition of the hardware ID is now described in detail.
  • the request sender 930 acquires the hardware ID as the identity information of the terminal.
  • the request transmitter 930 triggers the calculator 940, and the calculator 940 calculates the hardware ID of the terminal.
  • the calculator 940 first acquires the IMEI of the terminal, which is recorded as the first character string.
  • the calculator 940 obtains the network card address of the stolen mobile terminal, and removes non-alphabetic and non-numeric characters in the network card address, and the removed network card address is recorded as the second character string.
  • the calculator 940 acquires the CPU serial number of the terminal and records it as the third character string.
  • the calculator 940 merges the above three character strings in a predetermined order.
  • the predetermined sequence may be that the three strings are merged in the first, second, and third order, and the three strings may be merged in the third, second, and first reverse order, and may be other reservations.
  • the order of the present invention is not limited thereto.
  • the calculator 940 After merging the above strings, the calculator 940 converts the combined results into uppercase format and records them as the first result. After obtaining the first result, the calculator 940 performs an MD5 operation on the first result to obtain a second result. Thereafter, the calculator 940 converts the second result into an uppercase format to obtain the hardware ID of the terminal.
  • the hardware ID of the terminal is combined with the IMEI of the terminal, the network card address, and the serial number of the CPU to ensure that the status modification message received by the server is authentic and reliable, and avoids receiving the camouflage from the untrusted or malicious sender.
  • the status modification message sent by the terminal causes the server to incorrectly modify the status information of the terminal. For example, if the untrusted or malicious sender masquerades as the terminal sends a status modification message, the server instructs the server to modify the status information of the terminal from being stolen to being stolen. After the status information of the terminal is modified to be stolen, the criminals can perform processing such as brushing the terminal, which may result in the bad consequences that the owner cannot retrieve the terminal.
  • the embodiment of the present invention matches the hardware ID carried in the received state modification message with the hardware ID stored locally by the server. If the hardware ID matches, the IMEI, the network card address, and the CPU serial number of the terminal can be matched, and the present invention can be determined. The legality of the status modification message received by the embodiment of the invention. After the validity of the status modification message is determined, the status information of the terminal is modified to ensure that the status information of the terminal stored by the server can be updated in time.
  • the processing client of the stolen terminal (see Figure 9) is capable of receiving a status modification message from the server side and verifying it. When the verification passes, the status modification request is sent to the server. That is, in this embodiment, the function of the processing client of the stolen terminal is to verify the validity of the status modification message.
  • the embodiment of the present invention can achieve the following beneficial effects:
  • the embodiment of the present invention receives the status modification message from the sender and forwards it to the corresponding terminal, and the terminal verifies the status modification message to ensure that the received status modification message is a true and valid message, and avoids receiving the message from A status modification message sent by an untrusted or malicious sender causes the status information of the terminal to be maliciously modified. If the status information of the terminal is maliciously modified, the server may report the real-time location of the terminal user to the malicious sender, leak the user information to the malicious sender, or may cause the stolen terminal to be removed from the stolen identity, thereby failing to obtain the stolen terminal. Related information, it is impossible to capture the thief according to the information of the stolen terminal.
  • the embodiment of the present invention receives the status modification request returned by the terminal, and modifies the status information of the terminal according to the status modification request, which solves the problem that the other information cannot be provided in the prior art to indicate whether the terminal is stolen. problem.
  • the processing method of the stolen terminal provided by the embodiment of the present invention can change the status information of the stolen terminal. For example, after the terminal is stolen, the embodiment of the present invention can change the current state of the terminal to be stolen. If the thief is transacting on the stolen terminal, the buyer can check that the terminal has been stolen, thereby stopping the transaction and providing clues to the thief. Therefore, the use of the embodiment of the invention can achieve the beneficial effect of increasing the probability of the stolen terminal and effectively curbing the theft.
  • FIG. 10 shows a process flow diagram of a method of processing a stolen terminal in accordance with one embodiment of the present invention. As shown in FIG. 10, the flow includes at least steps S1002 to S1006.
  • Step S1002 Receive a state modification message from the sender, where the state modification message carries the identity information of the terminal and the current state of the terminal.
  • Step S1004 Perform validity verification on the state modification message by using the server.
  • Step S1006 Modify the state information of the terminal corresponding to the identity identification information to the current state according to the state modification message verified by the legality.
  • the embodiment of the present invention receives the state modification message from the sender, and verifies the state modification message to ensure that the received state modification message is a true and valid message, and avoids receiving the state sent by the untrusted or malicious sender.
  • the message is modified, causing the terminal's status information to be maliciously modified. If the status information of the terminal is maliciously modified, the server may report the real-time location of the terminal user to the malicious sender, leak the user information to the malicious sender, or may cause the stolen terminal to be removed from the stolen identity, thereby failing to obtain the stolen terminal. Related information, it is impossible to capture the thief according to the information of the stolen terminal.
  • the embodiment of the present invention modifies the status information of the terminal according to the status modification message, and solves the problem that the other identifier cannot be provided in the prior art to indicate whether the terminal is stolen.
  • the processing method of the stolen terminal provided by the embodiment of the present invention can change the status information of the stolen terminal. For example, after the terminal is stolen, the embodiment of the present invention can change the current state of the terminal to be stolen. If the thief is transacting on the stolen terminal, the buyer can check that the terminal has been stolen, thereby stopping the transaction and providing clues to the thief. Therefore, the use of the embodiment of the invention can achieve the beneficial effect of increasing the probability of the stolen terminal and effectively curbing the theft.
  • step S1002 and step S1004 in FIG. 10 after receiving the status modification message from the sender, in order to ensure that the received status modification message is authentic and reliable, avoid receiving the status sent from the untrusted or malicious sender.
  • the modification of the message causes the server to erroneously modify the status information of the terminal.
  • the embodiment of the present invention uses the server to verify the validity of the status modification message.
  • the status modification message from the sender carries the identity information of the terminal
  • the embodiment of the present invention uses the identity information of the terminal and the identity information stored locally by the server to match the validity of the status modification message. verification. Specifically, if the identity information of the terminal carried in the state modification message and the identity information stored locally by the server can match, the state modification message is legal; if the identity identification information of the terminal carried in the state modification message and the identity stored locally by the server If the identification information cannot be matched, the status modification message is invalid.
  • the embodiment of the present invention performs different operations based on the verification result of the state modification message. If the state modification message is not valid, the embodiment of the present invention cannot guarantee that the state modification message received by the server is authentic and reliable, and cannot ensure that the sender of the state modification message is not an untrusted or malicious sender. Therefore, when the embodiment of the invention When the state modification message is not valid, the embodiment of the present invention ignores the received state modification information and does not perform any operation to ensure that the server does not modify the state information of the terminal according to the state modification message from the untrusted party.
  • the embodiment of the present invention determines the terminal corresponding to the identifier information according to the identifier information of the terminal carried in the state modification message. After determining the corresponding terminal, the embodiment of the present invention performs corresponding modification on the state information of the terminal locally stored by the server according to the current state of the terminal in the state modification message, so that the state information of the terminal stored by the server can be updated in time.
  • the current state of the terminal may include that the terminal is stolen, the terminal is not stolen, the terminal is retrieved after being stolen, and the like.
  • the embodiment of the present invention modifies the status information of the terminal in time, so that the server can provide the stolen owner with the related information (such as the real-time location of the terminal, the fingerprint of the current user of the terminal, etc.).
  • the relevant clues of the terminal increase the possibility of the owner retrieving the terminal.
  • the embodiment of the present invention promptly modifies the state of the terminal to be retrieved after being stolen, and the server does not need to waste space and other resource queries and related information of the storage terminal.
  • the current state of the terminal in the embodiment of the present invention may further include other more detailed descriptions, such as the sale purchase status information of the terminal, such as the terminal not being sold, the terminal being used, and the terminal being resold, and may also be the current status of any other terminal.
  • the status information is not limited in this embodiment of the present invention.
  • the embodiment of the present invention After modifying the state information of the terminal to the current state, the embodiment of the present invention returns the modification result to the sender of the state modification information.
  • the modification result is sent to the sender, and the sender is reminded that the current state of the terminal has been modified, so that the sender can perform the corresponding operation according to the current state after the terminal is modified.
  • the terminal is a mobile phone
  • the user sends a status modification message to the stolen mobile phone using the number of friends and relatives bound to the stolen mobile phone, and the marked mobile phone has been stolen.
  • the server modifies the current state of the mobile phone according to the status modification message, if the modified result is returned to the relative friend number, the user can know in time that the mobile phone has been tagged and stolen, and further performs other anti-theft operations on the stolen mobile phone.
  • the identifier information of the terminal may be the IMEI of the terminal, and may be the ID of the terminal, and may be any identifier information that can uniquely identify the terminal, which is not limited in this embodiment of the present invention.
  • the embodiment of the present invention provides a terminal identity identifier.
  • the terminal identity is the hardware ID of the terminal. Since the acquisition of the hardware ID includes a comprehensive operation on the IMEI of the terminal, the network card address of the terminal, and the CPU serial number of the terminal, the hardware ID is a comprehensive identity of the terminal.
  • the hardware ID is used as the identifier of the terminal to verify the validity of the status modification message. If the status modification message is verified, the IMEI of the terminal, the network card address of the terminal, and the CPU serial number of the terminal are verified. There is a higher guarantee for the legitimacy of the status modification message.
  • For the calculation method of the hardware ID refer to the first embodiment.
  • the sender of the state modification message may be set in a mobile terminal, such as a mobile phone, a laptop computer, etc., and send a state modification message in the form of a short message or a network.
  • the sender in the embodiment of the present invention may also be disposed in a terminal, such as a computer, and send the status modification message in the form of a network.
  • the state information of the terminal can be modified in time. For example, after the terminal is stolen, the user can send a status modification message through various messaging platforms to ensure that the terminal is stolen in time. Further able to know in time The information about the stolen terminal increases the probability of the stolen terminal retrieving.
  • FIG. 11 is a flowchart of a processing method of a stolen terminal according to a preferred embodiment of the present invention, and supports a processing method of any of the stolen terminals described above, and the processing method of the stolen terminal is explained more clearly and easily.
  • the flow includes at least steps S1102 to S1110.
  • the sender of the state modification message is set to the mobile phone of the relatives and friends, and the terminal is set as the stolen mobile phone, wherein the mobile phone of the relatives and friends is stolen.
  • the mobile phone is bound to the phone number of the relatives and friends.
  • step S1102 a status modification message is sent, and the mobile phone is stolen.
  • the user can send a status modification message to the server through the mobile phone of the relative friend number bound in advance with the stolen mobile phone.
  • the preferred embodiment is capable of transmitting the status modification information to the server via short messages.
  • the status modification message sent to the server carries the identity information of the stolen mobile phone.
  • Step S1104 Determine whether the status modification message is legal.
  • the server After receiving the status modification message, the server performs legality verification on the status modification message. If the identity identification information carried in the status modification message cannot be matched with the identity information stored locally by the server, the server determines that the status modification message cannot pass the legality verification, and then performs step S1106. If the identity identification information carried in the status modification message matches the identity information stored locally by the server, the server determines that the status modification message passes the legality verification, and then performs step S1108.
  • step S1106 the state modification message does not pass the legality verification, and the server ignores the state modification message.
  • Step S1108 The state modification message is verified by legality, and the server modifies the state information of the stolen mobile phone according to the state modification message.
  • the server modifies the status information of the stolen mobile phone according to the status modification message to that the mobile phone has been stolen.
  • step S1110 the modification result is returned.
  • the server modifies the status information of the stolen mobile phone
  • the modified result is sent to the sender of the status modification message by the short message, that is, the relative friend mobile phone or the personal computer in the preferred embodiment.
  • the sender of the status modification message determines that the mobile phone has been successfully stolen.
  • FIG. 12 is a flowchart of a processing method of a stolen terminal according to another preferred embodiment of the present invention.
  • the processing method of any of the stolen terminals is always supported, and the processing method of the stolen terminal is more clearly explained. understand. Referring to FIG. 12, the flow includes at least steps S1202 through S1210.
  • the sender of the state modification message is set to the personal computer, and the terminal is set as the stolen mobile phone.
  • step S1202 a status modification message is sent, and the mobile phone is stolen.
  • the user can send a status modification message to the server through the personal computer.
  • the preferred embodiment is capable of transmitting a status modification message to the server over the network. And send The status modification message to the server carries the identity information of the stolen mobile phone.
  • Step S1204 Determine whether the status modification message is legal.
  • the server After receiving the status modification message, the server performs legality verification on the status modification message. If the identity modification information carried in the state modification message cannot be matched with the identity information stored locally by the server, the server determines that the state modification message cannot pass the legality verification, and then performs step S1206. If the identity identification information carried in the status modification message matches the identity information stored locally by the server, the server determines that the status modification message passes the legality verification, and then performs step S1208.
  • step S1206 the state modification message does not pass the legality verification, and the server ignores the state modification message.
  • Step S1208 The state modification message is verified by legality, and the server modifies the state information of the stolen mobile phone according to the state modification message.
  • the server modifies the status information of the stolen mobile phone according to the status modification message to that the mobile phone has been stolen.
  • Step S1210 Returning the modified result.
  • the server modifies the status information of the stolen mobile phone
  • the modification result is sent to the sending and receiving of the status modification message through the network, that is, the relative friends mobile phone or the personal computer in the preferred embodiment.
  • the sender of the status modification message determines that the mobile phone has been successfully stolen.
  • FIG. 13 is a flowchart of a processing method of a stolen terminal according to still another preferred embodiment of the present invention, and supports a processing method of any of the stolen terminals, and the processing method of the stolen terminal is more clearly understood. .
  • the flow includes at least steps S1302 through S1310.
  • the sender of the state modification message is set to the mobile phone of the relatives and friends, and the terminal is set as the stolen mobile phone, wherein the mobile phone of the relatives and friends is stolen.
  • the mobile phone is bound to the phone number of the relatives and friends.
  • step S1302 a status modification message is sent, and the mobile phone is stolen.
  • the user can send a status modification message to the server through the mobile phone of the relative friend number bound in advance with the stolen mobile phone.
  • the preferred embodiment is capable of transmitting the status modification information to the server over the network when using a family friend mobile phone.
  • the status modification message sent to the server carries the identity information of the stolen mobile phone.
  • Step S1304 Determine whether the status modification message is legal.
  • the server After receiving the status modification message, the server performs legality verification on the status modification message. If the identity identification information carried in the status modification message is not matched with the identity information stored locally by the server, the server determines that the status modification message cannot pass the legality verification, and then performs step S1306. If the identity identification information carried in the status modification message matches the identity information stored locally by the server, the server determines that the status modification message passes the legality verification, and then performs step S1308.
  • step S1306 the state modification message does not pass the legality verification, and the server ignores the state modification message.
  • Step S1308 The state modification message is verified by legality, and the server modifies the state information of the stolen mobile phone according to the state modification message.
  • the server modifies the status information of the stolen mobile phone according to the status modification message to that the mobile phone has been stolen.
  • Step S1310 returning the modification result.
  • the sender After the server modifies the status information of the stolen mobile phone, the sender sends the modification result to the sender of the status modification message, that is, the relative friend mobile phone or the personal computer in the preferred embodiment. After receiving the modification result returned by the server, the sender of the status modification message determines that the mobile phone has been successfully stolen.
  • the processing method of the stolen terminal provided by the foregoing preferred embodiments is based on the same inventive concept.
  • the embodiment of the present invention provides a server for implementing the processing method of the stolen terminal.
  • FIG. 14 is a block diagram showing the structure of a server according to an embodiment of the present invention.
  • the server of the embodiment of the present invention includes at least a receiver 1410, a determiner 1420, and a state modifier 1430.
  • the receiver 1410 is configured to receive a status modification message from the sender, where the status modification message carries the identity information of the terminal and the current status of the terminal.
  • the determiner 1420 is coupled to the receiver 1410 and configured to determine whether the status modification message passes the validity verification.
  • the state modifier 1430 is coupled to the determiner 1420 and configured to modify the state information of the terminal corresponding to the identity information to the current state according to the state modification message verified by the legality.
  • the embodiment of the present invention receives the state modification message from the sender, and verifies the state modification message to ensure that the received state modification message is a true and valid message, and avoids receiving the state sent by the untrusted or malicious sender.
  • the message is modified, causing the terminal's status information to be maliciously modified. If the status information of the terminal is maliciously modified, the server may report the real-time location of the terminal user to the malicious sender, leak the user information to the malicious sender, or may cause the stolen terminal to be removed from the stolen identity, thereby failing to obtain the stolen terminal. Related information, it is impossible to capture the thief according to the information of the stolen terminal.
  • the embodiment of the present invention modifies the status information of the terminal according to the status modification message, and solves the problem that the other identifier cannot be provided in the prior art to indicate whether the terminal is stolen.
  • the processing method of the stolen terminal provided by the embodiment of the present invention can change the status information of the stolen terminal. For example, after the terminal is stolen, the embodiment of the present invention can change the current state of the terminal to be stolen. If the thief is transacting on the stolen terminal, the buyer can check that the terminal has been stolen, thereby stopping the transaction and providing clues to the thief. Therefore, the use of the embodiment of the invention can achieve the beneficial effect of increasing the probability of the stolen terminal and effectively curbing the theft.
  • the receiver 1410 receives a status modification message from the sender, where the status modification message carries the identity of the terminal whose status information has changed. After receiving the status modification message from the sender, the receiver 1410 confirms that the accepted status modification message is authentic and reliable, and avoids receiving the status modification message sent by the untrusted or malicious sender, causing the server to perform status information on the terminal. In error modification, the receiver 1410 triggers the determiner 1420. After the determiner 1420 is triggered, the status modification message can be judged by legality. Specifically, if the identity information of the terminal carried in the state modification message can be matched with the identity information of the terminal stored locally by the server, the determiner 1420 determines that the state modification message passes the legality verification. If the identity information of the terminal carried in the state modification message and the identity information of the terminal locally stored by the server If the match is not possible, the determiner 1420 determines that the status modification message has not passed the legality verification.
  • the determiner 1420 After the determiner 1420 verifies the status modification message received by the receiver 1410, if the status modification message fails to pass the verification, the server cannot guarantee that the status modification message received by the server is authentic and valid, and cannot guarantee the status modification message.
  • the sender is not an untrusted or malicious sender. Therefore, when the determiner 1420 determines that the status verification information is invalid, the server ignores the status modification message and does not perform any operation to ensure that the server does not perform error modification on the status information of the terminal according to the status modification message from the untrusted party. If the determiner 1420 determines that the status modification message is legitimate, then the state modifier 1430 coupled to the determiner 1420 is triggered.
  • the state modifier After receiving the trigger, the state modifier determines the corresponding terminal according to the identity information of the terminal carried in the state modification message. After the terminal is determined, the state modifier 1420 modifies the state information of the terminal locally stored by the server according to the state modification message to ensure timely update of the state information of the terminal.
  • the current state of the terminal may include that the terminal is stolen, the terminal is not stolen, the terminal is retrieved after being stolen, and the like.
  • the state modifier 1420 corrects the state information of the terminal in time, so that the server can provide the stolen owner with the relevant information (such as the real-time location of the terminal, the fingerprint of the current user of the terminal, etc.).
  • the relevant clues of the terminal increase the possibility of the owner retrieving the terminal.
  • the state modifier 1420 in the server promptly modifies the state of the terminal to be retrieved after being stolen, and the server does not need to waste space and other resource queries and related information of the storage terminal.
  • the current state of the terminal in the embodiment of the present invention may further include other more detailed descriptions, such as the sale purchase status information of the terminal, such as the terminal not being sold, the terminal being used, and the terminal being resold, and may also be the current status of any other terminal.
  • the status information is not limited in this embodiment of the present invention.
  • the state modifier 1420 triggers the transmitter 1440 after modifying the state information of the terminal to the current state.
  • the sender 1440 returns the sender of the modification result status modification information.
  • the sender 1440 sends the modification result to the sender, and the sender is reminded that the current state of the terminal has been modified, so that the sender can perform the current state according to the modified state of the terminal.
  • the corresponding operation For example, when the terminal is a mobile phone, the user sends a status modification message to the stolen mobile phone using the number of friends and relatives bound to the stolen mobile phone, and the marked mobile phone has been stolen.
  • the server modifies the current state of the mobile phone according to the status modification message, if the modified result is returned to the relative friend number, the user can know in time that the mobile phone has been tagged and stolen, and further performs other anti-theft operations on the stolen mobile phone.
  • the identifier information of the terminal may be the IMEI of the terminal, and may be the user ID of the terminal, and may be any identifier information that can uniquely identify the terminal, which is not limited by the embodiment of the present invention.
  • the embodiment of the present invention provides a terminal identity identifier.
  • the terminal identity is the hardware ID of the terminal. Since the acquisition of the hardware ID includes a comprehensive operation on the IMEI of the terminal, the network card address of the terminal, and the CPU serial number of the terminal, the hardware ID is a comprehensive identity of the terminal.
  • the hardware ID is used as the identifier of the terminal to verify the validity of the status modification message. If the status modification message is verified, the IMEI of the terminal, the network card address of the terminal, and the CPU serial number of the terminal are verified. There is a higher guarantee for the legitimacy of the status modification message.
  • For the calculation method of the hardware ID refer to the first embodiment.
  • the sender of the state modification message may be set in a mobile terminal, such as a mobile phone. A laptop, etc., and sends a status modification message in the form of a short message or a network.
  • the sender in the embodiment of the present invention may also be disposed in a terminal, such as a computer, and send the status modification message in the form of a network.
  • the state information of the terminal can be modified in time. For example, after the terminal is stolen, the user can send a status modification message through various messaging platforms to ensure that the terminal is stolen in time. Further, the related information of the stolen terminal can be known in time, and the probability of the stolen terminal being recovered is increased.
  • the server receives a status modification message from the sender, authenticates it, and modifies it as it passes. That is, in the embodiment of the present invention, the function of the server is for verifying the state modification message, and modifying the state information of the locally stored terminal according to the corresponding request after the verification is passed.
  • the embodiment of the present invention can achieve the following beneficial effects:
  • the embodiment of the present invention receives the state modification message from the sender, and verifies the state modification message to ensure that the received state modification message is a true and valid message, and avoids receiving the state sent by the untrusted or malicious sender.
  • the message is modified, causing the terminal's status information to be maliciously modified. If the status information of the terminal is maliciously modified, the server may report the real-time location of the terminal user to the malicious sender, leak the user information to the malicious sender, or may cause the stolen terminal to be removed from the stolen identity, thereby failing to obtain the stolen terminal. Related information, it is impossible to capture the thief according to the information of the stolen terminal.
  • the embodiment of the present invention modifies the status information of the terminal according to the status modification message, and solves the problem that the other identifier cannot be provided in the prior art to indicate whether the terminal is stolen.
  • the processing method of the stolen terminal provided by the embodiment of the present invention can change the status information of the stolen terminal. For example, after the terminal is stolen, the embodiment of the present invention can change the current state of the terminal to be stolen. If the thief is transacting on the stolen terminal, the buyer can check that the terminal has been stolen, thereby stopping the transaction and providing clues to the thief. Therefore, the use of the embodiment of the invention can achieve the beneficial effect of increasing the probability of the stolen terminal and effectively curbing the theft.
  • modules in the devices of the embodiments can be adaptively changed and placed in one or more devices different from the embodiment.
  • the modules or units or components of the embodiments may be combined into one module or unit or component, and further they may be divided into a plurality of sub-modules or sub-units or sub-components.
  • any combination of all of the features disclosed in this specification, including the accompanying claims, abstract and drawings, and all processes or units of any method or apparatus so disclosed are combined.
  • Each feature disclosed in this specification (including the accompanying claims, the abstract and the drawings) may be replaced by alternative features that provide the same, equivalent or similar purpose.
  • the various component embodiments of the present invention may be implemented in hardware, or in a software module running on one or more processors, or in a combination thereof.
  • a microprocessor or digital signal processor may be used in practice to implement some or all of the functionality of some or all of the various devices in accordance with embodiments of the present invention.
  • the invention can also be implemented as a device or device program (e.g., a computer program and a computer program product) for performing some or all of the methods described herein.
  • a program implementing the invention may be stored on a computer readable medium or may be in the form of one or more signals. Such signals may be downloaded from an Internet website, provided on a carrier signal, or provided in any other form.
  • Figure 15 illustrates a computing device that can implement a method of processing a stolen terminal in accordance with the present invention.
  • the computing device conventionally includes a processor 1510 and a computer program product or computer readable medium in the form of a memory 1520.
  • the memory 1520 may be an electronic memory such as a flash memory, an EEPROM (Electrically Erasable Programmable Read Only Memory), an EPROM, a hard disk, or a ROM.
  • Memory 1520 has a storage space 1530 for program code 1531 for performing any of the method steps described above.
  • storage space 1530 for program code may include various program code 1531 for implementing various steps in the above methods, respectively.
  • the program code can be read from or written to one or more computer program products.
  • Such computer program products include program code carriers such as hard disks, compact disks (CDs), memory cards or floppy disks.
  • Such a computer program product is typically a portable or fixed storage unit as described with reference to FIG.
  • the storage unit may have a storage segment, a storage space, and the like that are similarly arranged to the storage 1520 in the computing device of FIG.
  • the program code can be compressed, for example, in an appropriate form.
  • the storage unit includes computer readable code 1531', ie, code that can be read by, for example, a processor such as 1510, which when executed by the computing device causes the computing device to perform each of the methods described above step.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Databases & Information Systems (AREA)
  • Telephonic Communication Services (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

本发明提供了多种被盗终端的处理方法及设备。其中,一种被盗终端的处理方法包括:接收来自发送方的状态修改消息,其中,状态修改消息中携带有本终端的当前状态;在状态修改消息合法的情况下,将状态修改消息转发至服务器,由服务器根据状态修改消息将服务器中存储的本终端的状态信息修改为当前状态。采用本发明实施例能够修改终端的状态信息,解决了现有技术中无法提供其他标识说明终端是否被盗的问题,能够达到增加被盗终端的找回机率并有效遏制偷盗行为的有益效果。

Description

被盗终端的处理方法及设备 技术领域
本发明涉及互联网应用领域,特别是涉及被盗终端的处理方法及设备。
背景技术
随着智能终端和网络的飞速发展,终端(包括电脑、手机、平板等多种设备)在人们生活中扮演的角色也越来越重要,越来越成为人们工作和生活中不可或缺的全方位“助手”。为方便使用,人们在使用终端的应用时通常会将各种账号信息、私人聊天记录以及图片照片等信息直接存储在终端。因此,若终端丢失,不仅会给用户带来财产损失,更为重要的是用户存储于终端内的私人信息,例如账号密码等财务信息。这些私人信息若被泄露,对用户造成的损失难以估计。因此,终端的防盗十分重要。
现有技术中,当终端丢失之后,失主仅能通过报警的手段说明终端被盗,无法提供其他标识说明终端被盗。但通过报警的手段说明终端被盗,仅仅失主以及警察等小范围人群能够知道终端被盗。大部分人,尤其是当偷盗者对被盗终端进行买卖交易时,购买被盗终端的人无法识别终端是否被盗。这种技术缺陷导致用户容易购买到被盗终端,进一步促进偷盗终端的不法行为的发生的恶劣后果。
发明内容
鉴于上述问题,提出了本发明以便提供一种克服上述问题或者至少部分地解决上述问题的被盗终端的处理方法以及相应的设备。
依据本发明的一个方面,提供了一种被盗终端的处理方法,包括:接收来自发送方的状态修改消息,其中,所述状态修改消息中携带有本终端的当前状态;在所述状态修改消息合法的情况下,将所述状态修改消息转发至服务器,由所述服务器根据所述状态修改消息将所述服务器中存储的本终端的状态信息修改为所述当前状态。
本发明还提供了一种被盗终端的处理客户端,包括:接收器,配置为接收来自发送方的状态修改消息,其中,所述状态修改消息中携带有终端的当前状态;合法判断器,配置为判断所述状态修改消息是否合法;发送器,配置为在所述状态修改消息合法的情况下,将所述状态修改消息转发至服务器,由所述服务器根据所述状态修改消息将所述服务器中存储的所述终端的状态信息修改为所述当前状态。
本发明还提供了一种服务器,包括:命令接收器,配置为接收终端发送的状态修改消息,其中,所述状态修改消息中携带有所述终端的当前状态以及所述终端的身份标识信息;状态修改器,配置为根据所述状态修改消息将本服务器中存储的所述终端的状态信息修改为所述当前状态。
根据本发明实施例,接收来自发送方的状态修改消息之后,对状态修改消息进行合法性验证,保证收到的状态修改消息是真实有效可信的命令,避免接收来自不可信或恶意的发送方发送的状态修改指令,导致终端的状态信息被恶意修改。若终端的状态信息被恶意修改,可能导致服务器反馈终端用户的实时位置至恶意发送方,泄露用户信息至恶意发送方,或者可能导致被盗终端被解除被盗标识,进而无法得到被盗终端的相关信息,无法根据被盗终端的相关信息对偷盗者进行抓获。在状态修改消息合法的情况下,本发明实施例提供的方法将状态修改消息转发至服务器,由服务器根据状态修改消息将服务器中存储的本终端的状态信息修改为当前状态,解决了现有技术中无法提供其他标识说明终端是否被盗的问题。采用本发明实施例提供的被盗终端的处理方法能够更改被盗终端的状态信息。例如,当终端被盗之后,采用本发明实施例能够更改终端的当前状态为已被盗。若偷盗者对被盗终端进行交易,购买者能够查询到终端被盗,进而停止交易并提供偷盗者的线索。因此,采用本发明实施例能够达到增加被盗终端的找回机率并有效遏制偷盗行为的有益效果。
依据本发明的另一个方面,提供了另一种被盗终端的处理方法,包括:接收来自发送方的状态修改消息,其中,所述状态修改消息中携带有状态发生改变的终端的身份标识信息;将所述状态修改消息转发至所述终端的身份标识信息对应的终端,由所述终端对其进行验证;根据所述终端验证所述状态修改消息通过时返回的状态修改请求,对所述终端的状态信息进行修改。
本发明还提供了一种服务器,包括:接收器,配置为接收来自发送方的状态修改消息,其中,所述状态修改消息中携带有状态发生改变的终端的身份标识信息;发送器,配置为将所述状态修改消息转发至所述终端的身份标识信息对应的终端,由所述终端对其进行验证;状态修改器,配置为根据所述终端验证所述状态修改消息通过时返回的状态修改请求,对所述终端的状态信息进行修改。
本发明还提供了一种被盗终端的处理客户端,包括:消息接收器,配置为接收服务器转发的、来自发送方的状态修改消息;验证器,配置为对接收到的状态修改消息进行验证;请求发送器,配置为所述状态修改消息通过验证之后,返回状态修改请求至所述服务器,由所述服务器根据所述状态修改请求对终端的状态进行修改。
根据本发明实施例,接收来自发送方的状态修改消息,并将其转发至对应的终端,由终端对该状态修改消息进行验证,保证收到的状态修改消息是真实有效可信的消息,避免接收来自不可信或恶意的发送方发送的状态修改消息,导致终端的状态信息被恶意修改。若终端的状态信息被恶意修改,可能导致服务器反馈终端用户的实时位置至恶意发送方,泄露用户信息至恶意发送方,或者可能导致被盗终端被解除被盗标识,进而无法得到被盗终端的相关信息,无法根据被盗终端的相关信息对偷盗者进行抓获。终端验证状态修改消息合法之后,本发明实施例接收终端返回的状态修改请求,并根据该状态修改请求对终端的状态信息进行修改,解决了现有技术中无法提供其他标识说明终端是 否被盗的问题。采用本发明实施例提供的被盗终端的处理方法能够更改被盗终端的状态信息。例如,当终端被盗之后,采用本发明实施例能够更改终端的当前状态为已被盗。若偷盗者对被盗终端进行交易,购买者能够查询到终端被盗,进而停止交易并提供偷盗者的线索。因此,采用本发明实施例能够达到增加被盗终端的找回机率并有效遏制偷盗行为的有益效果。
依据本发明的又一个方面,提供了又一种被盗终端的处理方法,包括:接收来自发送方的状态修改消息,其中,所述状态修改消息中携带有终端的身份标识信息以及所述终端的当前状态;利用服务器对所述状态修改消息进行合法性验证;根据通过合法性验证的所述状态修改消息修改所述身份标识信息对应的终端的状态信息至所述当前状态。
本发明还提供了一种服务器,包括:接收器,配置为接收来自发送方的状态修改消息,其中,所述状态修改消息中携带有终端的身份标识信息以及所述终端的当前状态;判断器,配置为判断所述状态修改消息是否通过合法性验证;状态修改器,配置为根据通过合法性验证的所述状态修改消息修改所述身份标识信息对应的终端的状态信息至所述当前状态。
根据本发明实施例,接收来自发送方的状态修改消息,并利用服务器对该状态修改消息进行验证,保证收到的状态修改消息是真实有效可信的消息,避免接收来自不可信或恶意的发送方发送的状态修改消息,导致终端的状态信息被恶意修改。若终端的状态信息被恶意修改,可能导致服务器反馈终端用户的实时位置至恶意发送方,泄露用户信息至恶意发送方,或者可能导致被盗终端被解除被盗标识,进而无法得到被盗终端的相关信息,无法根据被盗终端的相关信息对偷盗者进行抓获。状态修改消息通过合法性验证之后,本发明实施例根据该状态修改消息对终端的状态信息进行修改,解决了现有技术中无法提供其他标识说明终端是否被盗的问题。采用本发明实施例提供的被盗终端的处理方法能够更改被盗终端的状态信息。例如,当终端被盗之后,采用本发明实施例能够更改终端的当前状态为已被盗。若偷盗者对被盗终端进行交易,购买者能够查询到终端被盗,进而停止交易并提供偷盗者的线索。因此,采用本发明实施例能够达到增加被盗终端的找回机率并有效遏制偷盗行为的有益效果。
根据本发明的再一个方面,提供了一种计算机程序,其包括计算机可读代码,当所述计算机可读代码在计算设备上运行时,导致所述计算设备执行根据本发明的被盗终端的处理方法。
根据本发明的再一个方面,提供了一种计算机可读介质,其中存储了根据本发明的被盗终端的处理方法的计算机程序。
上述说明仅是本发明技术方案的概述,为了能够更清楚了解本发明的技术手段,而可依照说明书的内容予以实施,并且为了让本发明的上述和其它目的、特征和优点能够更明显易懂,以下特举本发明的具体实施方式。
附图说明
通过阅读下文优选实施方式的详细描述,各种其他的优点和益处对于本领域普通技术人员将变得清楚明了。附图仅用于示出优选实施方式的目的,而并不认为是对本发明的限制。而且在整个附图中,用相同的参考符号表示相同的部件。在附图中:
图1示出了根据本发明一个实施例的被盗终端的处理方法的处理流程图;
图2示出了根据本发明又一个实施例的被盗终端的处理方法的处理流程图;
图3示出了根据本发明一个实施例的被盗终端的处理客户端的结构示意图;
图4示出了根据本发明一个实施例的服务器的结构示意图;
图5示出了根据本发明又一个实施例的被盗终端的处理方法的处理流程图;
图6示出了根据本发明又一个实施例的被盗终端的处理方法的处理流程图;
图7示出了根据本发明又一个实施例的被盗终端的处理方法的处理流程图;
图8示出了根据本发明又一个实施例的服务器的结构示意图;
图9示出了根据本发明又一个实施例的被盗终端的处理客户端的结构示意图;
图10示出了根据本发明又一个实施例的被盗终端的处理方法的处理流程图;
图11示出了根据本发明又一个实施例的被盗终端的处理方法的处理流程图;
图12示出了根据本发明又一个优选实施例的被盗终端的处理方法的处理流程图;
图13示出了根据本发明又一个优选实施例的被盗终端的处理方法的处理流程图;
图14示出了根据本发明又一个实施例的服务器的结构示意图;
图15示意性地示出了用于执行根据本发明的被盗终端的处理方法的计算设备的框图;以及
图16示意性地示出了用于保持或者携带实现根据本发明的被盗终端的处理方法的程序代码的存储单元。
具体实施方式
下面结合附图和具体的实施方式对本发明作进一步的描述。
相关技术中提及,无法确定终端是否被盗,因此,当终端被盗之后,失主目前仅能通过报警的手段说明终端被盗,无法提供其他标识说明终端被盗。这种技术缺陷导致用户容易购买到被盗终端,使得偷盗终端的不法行为能够产生恶劣后果。
实施例一
为解决上述技术问题,本发明实施例提供了一种被盗终端的处理方法。图1示出了根据本发明一个实施例的被盗终端处理方法的处理流程图。如图1所示,该流程至少包括步骤S102至步骤S104。
步骤S102、接收来自发送方的状态修改消息,其中,状态修改消息中携带有本终端的当前状态。
步骤S104、在状态修改消息合法的情况下,将状态修改消息转发至服务器,由服务器根据状态修改消息将服务器中存储的本终端的状态信息修改为当前状态。
本发明实施例接收来自发送方的状态修改消息之后,对状态修改消息进行合法性验证,保证收到的状态修改消息是真实有效可信的命令,避免接收来自不可信或恶意的发送方发送的状态修改指令,导致终端的状态信息被恶意修改。若终端的状态信息被恶意修改,可能导致服务器反馈终端用户的实时位置至恶意发送方,泄露用户信息至恶意发送方,或者可能导致被盗终端被解除被盗标识,进而无法得到被盗终端的相关信息,无法根据被盗终端的相关信息对偷盗者进行抓获。在状态修改消息合法的情况下,本发明实施例提供的方法将状态修改消息转发至服务器,由服务器根据状态修改消息将服务器中存储的本终端的状态信息修改为当前状态,解决了现有技术中无法提供其他标识说明终端是否被盗的问题。采用本发明实施例提供的被盗终端的处理方法能够更改被盗终端的状态信息。例如,当终端被盗之后,采用本发明实施例能够更改终端的当前状态为已被盗。若偷盗者对被盗终端进行交易,购买者能够查询到终端被盗,进而停止交易并提供偷盗者的线索。因此,采用本发明实施例能够达到增加被盗终端的找回机率并有效遏制偷盗行为的有益效果。
步骤S102在执行时,接收来自发送方的状态修改消息,其中,发送方的身份需要进行验证,若发送方身份验证通过,则证明来自发送方的状态修改消息是合法的,可以继续执行防盗操作;若发送方身份验证不通过,则证明来自发送方的状态修改消息是不合法的,不需要继续执行防盗操作。
本发明实施例中,发送方身份通常可以由一个号码指代,发送方与该号码一一对应。在被盗终端侧,为保证发送方身份验证的可靠性,通常提供一个可信任号码的列表,其中存储着该被盗终端的可信任号码,例如亲友号码、约定认证码等。因此,在对状态修改消息进行合法性验证时,可以将代表发送方的号码与被盗终端侧存储的可信任号码进行匹配。若两者匹配,则发送方身份验证通过,且由该发送方发出的状态修改消息合法。若两者不匹配,则发送方身份验证不通过,相应的,由该发送方发出的状态修改消息也不合法。
考虑到发送方需要发送不同的命令,且需要进行身份合法验证,因此,在本例中,发送方可以为能够发出命令且具备独特标识的终端,例如手机之类的移动终端,每个移动终端具备独特的电话号码可供身份合法验证,且能够通过短信或网络等多种手段发出消息或指令。
本发明实施例对状态修改消息进行合法性验证之后,根据验证结果执行不同操作。具体地,若状态修改消息未通过合法性验证,则本发明实施例忽略该状态修改消息,若状态修改消息通过合法性验证,则本发明实施例获取被盗移动终端的身份标识信息。本发明实施例中,获取到终端的身份标识信息之后,发送携带有身份标识信息的状态修改消息至服务器。
服务器接收到携带有终端的身份标识信息的状态修改消息之后,本发明实施例利用 服务器验证该状态修改消息是否合法。具体地,本发明实施例通过判断状态修改消息中携带的身份标识信息与服务器中存储的身份标识信息是否匹配对状态修改消息的合法性进行验证。若状态修改消息中携带的身份标识信息与服务器中存储的身份标识信息匹配,则本发明实施例判断状态修改消息合法。若状态修改消息中携带的身份标识信息与服务器中存储的身份标识信息不匹配,则本发明实施例判断状态修改消息不合法。
上文提及,本发明实施例根据对状态修改消息合法性的判断结果执行下一步操作。当状态修改消息不合法时,本发明实施例忽略该状态修改消息。当状态修改消息合法时,本发明实施例触发服务器中的状态信息修改操作。服务器受到触发之后,根据状态修改消息将服务器中存储的终端的状态信息修改为当前状态。
优选地,本发明实施例中,当服务器将终端的状态信息修改为当前状态之后,服务器返回修改结果至终端,并通过终端发送该修改结果至上述发送方。本发明实施例中,对终端的当前状态修改之后,将修改结果发送至终端,再由终端转发至发送方,分别提醒终端和发送方两者该终端的当前状态已修改,进而使得终端以及发送方能够根据终端修改后的当前状态执行相应操作。例如,当终端为手机时,用户使用与被盗手机绑定的亲友号码发送状态修改消息至被盗手机,标记手机已被盗。当服务器根据状态修改消息修改手机当前状态为已被盗之后,若返回修改结果至被盗手机以及亲友号码,则被盗手机能够确定自身被盗,进而执行防盗操作,如对手机进行锁屏、获取偷盗者的指纹或者照片等防盗操作。另外,用户能够及时获知手机已标记被盗,进一步对被盗手机执行其他防盗操作。
本发明实施例中,终端的身份标识信息可以是终端的国际移动设备身份识别码(International Mobile Equipment Identity,以下简称IMEI),可以是终端的用户身份标识码(Identity,以下简称ID),还可以是任意能够唯一标识终端的身份标识信息,本发明实施例对此并不加以限定。为提高终端的安全性,确定服务器接收到的状态修改消息为经过终端验证的合法状态修改消息,优选地,本发明实施例提供一种终端身份标识。该终端身份标识为终端的硬件ID。
现对该硬件ID的获取进行具体介绍。上文提及,本发明实施例确定发送方发送的状态修改消息合法之后,获取上述硬件ID。为获取硬件ID,本发明实施例首先获取终端的IMEI,记为第一字符串。其次,本发明实施例获取被盗移动终端的网卡地址,并去除网卡地址中的非字母以及非数字字符,去除后的网卡地址记为第二字符串。获取到第一字符串以及第二字符串之后,本发明实施例获取终端的中央处理器(Central Processing Unit,以下简称CPU)串号,记为第三字符串。获取到第一、第二以及第三字符串之后,本发明实施例按预定顺序合并上述三个字符串。其中,该预定顺序可以是按第一、第二、第三的顺序合并上述三个字符串,可以是按第三、第二、第一的倒序合并上述三个字符串,还可以是其他预定的顺序,本发明实施例对此并不加以限定。
合并上述字符串之后,本发明实施例将合并后得到的结果转换为大写格式,并记为第一结果。获取到第一结果之后,本发明实施例继续将该第一结果进行消息摘要算法第 五版(Message Digest Algorithm 5,以下简称MD5)运算,得到第二结果。之后,本发明实施例将该第二结果转换为大写格式得到终端的硬件ID。
本发明实施例中终端的硬件ID通过将终端的IMEI、网卡地址以及CPU的串号进行合并运算能够保证服务器接收的状态修改消息是真实有效可信的,避免接收来自不可信或恶意发送端伪装成终端发送的状态修改消息导致服务器对终端的状态信息进行错误修改。例如,若不可信或恶意发送端伪装成终端发送状态修改消息指示服务器将终端的状态信息从被盗修改为解除被盗。当终端的状态信息修改为解除被盗之后,不法分子可以对终端进行刷机等处理,导致失主无法找回终端的恶劣后果。本发明实施例将接收到的状态修改消息中携带的硬件ID与服务器本地存储的硬件ID进行匹配,若硬件ID匹配,则终端的IMEI、网卡地址以及CPU串号均能够匹配,则能够确定本发明实施例接收到的状态修改消息的合法性。确定状态修改消息的合法性之后,对终端的状态信息进行修改保证服务器存储的终端的状态信息能够及时更新。
另外,本发明实施例中,终端的当前状态可以包括终端被盗以及终端未被盗、终端被盗后找回等等。当终端被盗之后,本发明实施例对终端的状态信息进行及时更新,以便服务器接收到终端的相关信息(如终端的实时位置、终端当前使用者的指纹等)之后,能够向失主提供被盗终端的相关线索,增加失主找回终端的可能性。当终端被盗后找回之后,本发明实施例及时更新终端的状态为被盗后找回,服务器也就无需浪费空间等资源查询以及存储终端的相关信息。进一步,本发明实施例的终端的当前状态还可以包括其他更为详细的说明,例如包括终端未出售、终端使用中以及终端被转卖等终端的出售购买状态信息,还可以是其他任意终端的当前状态信息,本发明实施例对此并不加以限定。
现以具体实施例对本发明的被盗终端的处理方法进行进一步说明。
图2示出了根据本发明一个优选实施例的被盗终端的处理方法的处理流程图,用于支持上述任意一个被盗终端的处理方法,将上述被盗终端的处理方法阐述得更加清晰易懂。参见图2,该优选实施例至少包括步骤S202至步骤S220。
需要说明的是,为将本优选实施例阐述得更加简单明白,本优选实施例中,将状态修改消息的发送方设置为亲友号码,将终端设置为被盗终端。其中,亲友号码为被盗手机被盗绑定的号码。
步骤S202、亲友手机发送状态修改消息至被盗手机,标记手机被盗。
具体地,用户发现手机被盗之后,使用与被盗手机绑定的亲友号码发送携带有状态修改消息的短信至被盗手机,要求标记手机的当前状态为手机被盗。
步骤S204、判断状态修改消息是否合法。
被盗手机接收到亲友号码发送的状态修改消息之后,判断状态修改消息的发送方与被盗手机存储的亲友号码是否匹配。若未能匹配,则执行步骤S206。若能够匹配,则执行步骤S208。
步骤S206、当被盗手机判断状态修改消息不合法时,忽略状态修改消息。
步骤S208、当被盗手机判断状态修改消息合法时,获取自身的硬件ID。
步骤S210、转发状态修改消息。
当被盗手机接收到状态修改消息并判断该命令合法之后,执行步骤S210,转发携带有通过步骤S208获取的硬件ID的状态修改消息。
步骤S212、判断状态修改消息是否合法。
服务器接收到被盗手机转发的状态修改消息之后,对状态修改消息中携带的被盗手机的硬件ID以及服务器本地存储的硬件ID进行匹配。若未能匹配,则服务器判断状态修改消息不合法,执行步骤S214。若能够匹配,则服务器判断状态修改消息合法,执行步骤S216。
步骤S214、当服务器判断状态修改消息不合法时,忽略状态修改消息。
步骤S216、当服务器判断状态修改消息合法时,修改被盗手机的状态信息为手机被盗。
当服务器判断接收到的状态修改消息合法之后,服务器根据状态修改消息将被盗手机的状态修改为手机被盗。
步骤S218、返回修改结果至被盗手机。
服务器根据状态修改消息将手机的状态信息修改为手机被盗之后,返回该修改结果至被盗手机,保证被盗手机能够及时获知自身的当前状态。
步骤S220、发送修改结果至亲友号码。
被盗手机接收到服务器返回的修改结果之后,将该修改结果发送至亲友号码。亲友号码接收到对被盗手机的状态信息的修改,则用户能够获知服务器已对被盗手机进行标识。
基于上文各优选实施例提供的被盗终端的处理方法,基于同一发明构思,本发明实施例提供一种被盗终端的处理客户端,用于实现上述被盗终端的处理方法。
图3示出了根据本发明一个实施例的被盗终端的处理客户端的结构示意图。参见图3,本发明实施例的被盗终端的处理客户端至少包括:接收器310、合法判断器320以及发送器330。
现介绍本发明实施例的被盗终端的处理客户端的各器件或组成的功能以及各部分间的连接关系:
接收器310,配置为接收来自发送方的状态修改消息,其中,状态修改消息中携带有终端的当前状态。
合法判断器320,与接收器310相耦合,配置为判断状态修改消息是否合法。
发送器330,与接收器310以及合法判断器320分别耦合,配置为在状态修改消息合法的情况下,将状态修改消息转发至服务器,由服务器根据状态修改消息将服务器中存储的终端的状态信息修改为当前状态。
本发明实施例接收来自发送方的状态修改消息之后,对状态修改消息进行合法性验证,保证收到的状态修改消息是真实有效可信的命令,避免接收来自不可信或恶意的发 送方发送的状态修改指令,导致终端的状态信息被恶意修改。若终端的状态信息被恶意修改,可能导致服务器反馈终端用户的实时位置至恶意发送方,泄露用户信息至恶意发送方,或者可能导致被盗终端被解除被盗标识,进而无法得到被盗终端的相关信息,无法根据被盗终端的相关信息对偷盗者进行抓获。在状态修改消息合法的情况下,本发明实施例将状态修改消息转发至服务器,由服务器根据状态修改消息将服务器中存储的本终端的状态信息修改为当前状态,解决了现有技术中无法提供其他标识说明终端是否被盗的问题。采用本发明实施例提供的被盗终端的处理客户端能够更改被盗终端的状态信息。例如当终端被盗之后,采用本发明实施例能够更改终端的当前状态为已被盗。若偷盗者对被盗终端进行交易,购买者能够查询到终端被盗,进而停止交易并提供偷盗者的线索。因此,采用本发明实施例能够达到增加被盗终端的找回机率并有效遏制偷盗行为的有益效果。
本发明实施例中,客户端中的接收器310接收来自发送方的状态修改消息,发送方的身份需要由合法判断器320进行验证,若经过合法判断器320验证,状态修改消息的发送方与终端中存储的可信任号码匹配,则状态修改消息通过合法性验证,可以继续执行防盗操作;若经过合法判断器320验证,状态修改消息的发送方与终端中存储的可信任号码不匹配,不需要继续执行防盗操作。
本发明实施例中,发送方身份通常可以由一个号码指代,发送方与该号码一一对应。在被盗终端侧,为保证发送方身份验证的可靠性,通常提供一个可信任号码的列表,其中存储着该被盗终端的可信任号码,例如亲友号码、约定认证码等。因此,在对状态修改消息进行合法性验证时,可以将代表发送方的号码与被盗终端侧存储的可信任号码进行匹配。若两者匹配,则发送方身份验证通过,且由该发送方发出的状态修改消息合法。若两者不匹配,则发送方身份验证不通过,相应的,由该发送方发出的状态修改消息也不合法。
若经过合法判断器320的验证,状态修改消息不合法,则如图3所示的客户端忽略该状态修改消息。若经过合法判断器320的验证,状态修改消息合法,则合法判断器320触发发送器330,由发送器330获取终端的身份标识信息。发送器330获取到身份标识信息之后,发送携带有该身份标识信息的状态修改消息至服务器。
服务器接收到携带有终端的身份标识信息的状态修改消息之后,验证该状态修改消息是否合法。具体地,服务器通过判断状态修改消息中携带的身份标识信息与服务器本地存储的身份标识信息是否匹配对状态修改消息的合法性进行验证。若状态修改消息中携带的身份标识信息与服务器中存储的身份标识信息匹配,则判断状态修改消息合法。若状态修改消息中携带的身份标识信息与服务器中存储的身份标识信息不匹配,则判断状态修改消息不合法。当服务器判断状态修改消息不合法时,服务器忽略该状态修改消息。当服务器判断该状态修改消息合法时,服务器根据该状态修改消息对本地存储的终端的状态信息进行修改,并返回修改结果。
如图3所示的客户端中的接收器310接收到服务器返回的修改结果之后,触发发送 器330,由发送器330将该修改结果转发至上述状态修改消息的发送方。本发明实施例中,对终端的当前状态修改之后,将修改结果发送至如图3所示的客户端,再由客户端转发至发送方,分别提醒终端和发送方两者该终端的当前状态已修改,进而使得发送方能够根据终端修改后的当前状态执行相应操作。例如,当终端为手机时,用户使用与被盗手机绑定的亲友号码发送状态修改消息至被盗手机,标记手机已被盗。当服务器根据状态修改消息修改手机当前状态为已被盗之后,若返回修改结果至亲友号码,则用户能够及时获知手机已标记被盗,进一步对被盗手机执行其他防盗操作。
本发明实施例中,终端的身份标识信息可以是终端的IMEI,可以是终端的用户ID,还可以是任意能够唯一标识终端的身份标识信息,本发明实施例对此并不加以限定。为提高终端的安全性,确定服务器接收到的状态修改消息为经过终端验证的合法状态修改消息,优选地,本发明实施例提供一种终端身份标识。该终端身份标识为终端的硬件ID。
现对该硬件ID的获取进行具体介绍。上文提及,合法判断器320判断发送方发送的状态修改消息合法之后,由发送器330获取作为终端的身份标识信息的硬件ID。本发明实施中,发送器330触发计算器340,由计算器340计算终端的硬件ID。具体地,计算器340首先获取终端的IMEI,记为第一字符串。其次,计算器340获取被盗移动终端的网卡地址,并去除网卡地址中的非字母以及非数字字符,去除后的网卡地址记为第二字符串。计算器340获取到第一字符串以及第二字符串之后,获取终端的CPU串号,记为第三字符串。获取到第一、第二以及第三字符串之后,计算器340按预定顺序合并上述三个字符串。其中,该预定顺序可以是按第一、第二、第三的顺序合并上述三个字符串,可以是按第三、第二、第一的倒序合并上述三个字符串,还可以是其他预定的顺序,本发明实施例对此并不加以限定。
合并上述字符串之后,计算器340将合并后得到的结果转换为大写格式,并记为第一结果。获取到第一结果之后,计算器340将该第一结果进行MD5运算,得到第二结果。之后,计算器340将该第二结果转换为大写格式得到终端的硬件ID。
本发明实施例中终端的硬件ID通过将终端的IMEI、网卡地址以及CPU的串号进行合并运算能够保证服务器接收的状态修改消息是真实有效可信的,避免接收来自不可信或恶意发送端伪装成终端发送的状态修改消息导致服务器对终端的状态信息进行错误修改。例如,若不可信或恶意发送端伪装成终端发送状态修改消息指示服务器将终端的状态信息从被盗修改为解除被盗。当终端的状态信息修改为解除被盗之后,不法分子可以对终端进行刷机等处理,导致失主无法找回终端的恶劣后果。本发明实施例将接收到的状态修改消息中携带的硬件ID与服务器本地存储的硬件ID进行匹配,若硬件ID匹配,则终端的IMEI、网卡地址以及CPU串号均能够匹配,则能够确定本发明实施例接收到的状态修改消息的合法性。确定状态修改消息的合法性之后,对终端的状态信息进行修改保证服务器存储的终端的状态信息能够及时更新。
另外,本发明实施例中,终端的当前状态可以包括终端被盗以及终端未被盗、终端被盗后找回等等。当终端被盗之后,本发明实施例对终端的状态信息进行及时更新,以 便服务器接收到终端的相关信息(如终端的实时位置、终端当前使用者的指纹等)之后,能够向失主提供被盗终端的相关线索,增加失主找回终端的可能性。当终端被盗后找回之后,本发明实施例及时更新终端的状态为被盗后找回,服务器也就无需浪费空间等资源查询以及存储终端的相关信息。进一步,本发明实施例的终端的当前状态还可以包括其他更为详细的说明,例如包括终端未出售、终端使用中以及终端被转卖等终端的出售购买状态信息,还可以是其他任意终端的当前状态信息,本发明实施例对此并不加以限定。
在本实施例中,被盗终端的处理客户端(参见图3)能够接收来自发送方的状态修改消息,并对其进行验证。当验证通过时,将该状态修改消息转发至服务器。即,本实施例中,被盗终端的处理客户端的功能为验证状态修改消息的合法性。
基于上文各优选实施例提供的被盗终端的处理方法及客户端,基于同一发明构思,本发明实施例提供了一种服务器,用于实现上述被盗终端的处理方法。
图4示出了根据本发明一个实施例的服务器的结构示意图。参见图4,本发明实施例的服务器至少包括:命令接收器410以及状态修改器430。
现介绍本发明实施例的服务器的各器件或组成的功能以及各部分间的连接关系:
命令接收器410,配置为接收终端发送的状态修改消息,其中,状态修改消息中携带有终端的当前状态以及终端的身份标识信息;
状态修改器430,与命令接收器410耦合,配置为根据状态修改消息将本服务器中存储的终端的状态信息修改为当前状态。
本发明实施例中,将状态修改消息转发至服务器,由服务器根据状态修改消息将服务器中存储的本终端的状态信息修改为当前状态,解决了现有技术中无法提供其他标识说明终端是否被盗的问题。采用本发明实施例提供的被盗终端的处理方法能够更改被盗终端的状态信息。例如当终端被盗之后,采用本发明实施例能够更改终端的当前状态为已被盗。若偷盗者对被盗终端进行交易,购买者能够查询到终端被盗,进而停止交易并提供偷盗者的线索。因此,采用本发明实施例能够达到增加被盗终端的找回机率并有效遏制偷盗行为的有益效果。
如图4所示的服务器中的命令接收器410接收到携带有终端的身份标识信息的状态修改消息之后,状态修改器430根据状态修改消息对本地存储的终端的状态信息进行修改。优选地,本发明实施例在服务器中添加如图4所示的判断器420。当命令接收器410接收到状态修改消息之后,由判断器420判断该状态修改消息是否合法。具体地,判断器420通过判断状态修改消息中携带的身份标识信息与服务器中存储的身份标识信息是否匹配对状态修改消息的合法性进行验证。若状态修改消息中携带的身份标识信息与服务器中存储的身份标识信息匹配,则判断器420判断状态修改消息合法。若状态修改消息中携带的身份标识信息与服务器中存储的身份标识信息不匹配,则判断器420判断状态修改消息不合法。
本发明实施例中,终端的身份标识信息可以是终端的IMEI,可以是终端的用户ID, 还可以是任意能够唯一标识终端的身份信息,本发明实施例对此并不加以限定。为提高终端的安全性,确定服务器接收到的状态修改消息为经过终端验证的合法状态修改消息,优选地,本发明实施例提供一种终端身份标识。该终端身份标识为终端的硬件ID。
判断器420对状态修改消息的合法性进行判断之后,触发状态修改器430。状态修改器430根据判断器420的判断结果执行下一步操作。当状态修改消息不合法时,状态修改器430忽略该状态修改消息。当状态修改消息合法时,状态修改器430根据状态修改消息将服务器中存储的终端的状态信息修改为当前状态。
状态修改器430将本地存储的终端的状态信息修改为当前状态之后,由结果发送器440将修改结果发送至终端。本发明实施例中,状态修改器430对终端的当前状态修改之后,结果发送器440将修改结果发送至终端,并由终端发送该修改结果至发送方,提醒发送方终端的当前状态。发送方能够根据终端的当前状态执行相应操作。
另外,本发明实施例中,终端的当前状态可以包括终端被盗以及终端未被盗、终端被盗后找回等等。当终端被盗之后,客户端中的状态修改器430对终端的状态信息进行及时更新,以便服务器接收到终端的相关信息(如终端的实时位置、终端当前使用者的指纹等)之后,能够向失主提供被盗终端的相关线索,增加失主找回终端的可能性。当终端被盗后找回之后,状态修改器430及时更新终端的状态为被盗后找回,服务器也就无需浪费空间等资源查询以及存储终端的相关信息。进一步,本发明实施例的终端的当前状态还可以包括其他更为详细的说明,例如包括终端未出售、终端使用中以及终端被转卖等终端的出售购买状态信息,还可以是其他任意终端的当前状态信息,本发明实施例对此并不加以限定。
在本实施例中,服务器(参见图4)接收经过终端验证的状态修改消息,对其进行修改。即,在本发明实施例中,服务器的功能是用于修改本地存储的终端的状态信息。当然,为增加安全性,可以对状态修改消息进行进一步验证。
根据上述任意一个优选实施例或多个优选实施例的组合,本发明实施例能够达到如下有益效果:
本发明实施例接收来自发送方的状态修改消息之后,对状态修改消息进行合法性验证,保证收到的状态修改消息是真实有效可信的命令,避免接收来自不可信或恶意的发送方发送的状态修改指令,导致终端的状态信息被恶意修改。若终端的状态信息被恶意修改,可能导致服务器反馈终端用户的实时位置至恶意发送方,泄露用户信息至恶意发送方,或者可能导致被盗终端被解除被盗标识,进而无法得到被盗终端的相关信息,无法根据被盗终端的相关信息对偷盗者进行抓获。在状态修改消息合法的情况下,本发明实施例提供的方法将状态修改消息转发至服务器,由服务器根据状态修改消息将服务器中存储的本终端的状态信息修改为当前状态,解决了现有技术中无法提供其他标识说明终端是否被盗的问题。采用本发明实施例提供的被盗终端的处理方法能够更改被盗终端的状态信息。例如当终端被盗之后,采用本发明实施例能够更改终端的当前状态为已被盗。若偷盗者对被盗终端进行交易,购买者能够查询到终端被盗,进而停止交易并提供 偷盗者的线索。因此,采用本发明实施例能够达到增加被盗终端的找回机率并有效遏制偷盗行为的有益效果。
实施例二
本实施例提供了一种被盗终端的处理方法。图5示出了根据本发明一个实施例的被盗终端的处理方法的处理流程图。如图5所示,该流程至少包括步骤S502至步骤S506。
步骤S502、接收来自发送方的状态修改消息,其中,状态修改消息中携带有状态发生改变的终端的身份标识信息。
步骤S504、将状态修改消息转发至终端的身份标识信息对应的终端,由终端对其进行验证。
步骤S506、根据终端验证状态修改消息通过时返回的状态修改请求,对终端的状态信息进行修改。
本发明实施例接收来自发送方的状态修改消息,并将其转发至对应的终端,由终端对该状态修改消息进行验证,保证收到的状态修改消息是真实有效可信的消息,避免接收来自不可信或恶意的发送方发送的状态修改消息,导致终端的状态信息被恶意修改。若终端的状态信息被恶意修改,可能导致服务器反馈终端用户的实时位置至恶意发送方,泄露用户信息至恶意发送方,或者可能导致被盗终端被解除被盗标识,进而无法得到被盗终端的相关信息,无法根据被盗终端的相关信息对偷盗者进行抓获。终端验证状态修改消息合法之后,本发明实施例接收终端返回的状态修改请求,并根据该状态修改请求对终端的状态信息进行修改,解决了现有技术中无法提供其他标识说明终端是否被盗的问题。采用本发明实施例提供的被盗终端的处理方法能够更改被盗终端的状态信息。例如,当终端被盗之后,采用本发明实施例能够更改终端的当前状态为已被盗。若偷盗者对被盗终端进行交易,购买者能够查询到终端被盗,进而停止交易并提供偷盗者的线索。因此,采用本发明实施例能够达到增加被盗终端的找回机率并有效遏制偷盗行为的有益效果。
步骤S502在执行时,接收来自发送方的状态修改消息,其中,该状态修改消息中携带有状态发生改变的终端的身份标识信息。优选地,为保证接收到的状态修改消息真实有效可信,本发明实施例对接收到的状态修改消息进行验证。若状态修改消息通过验证,可以继续执行防盗操作;若状态修改消息未通过验证,不需要继续执行防盗操作。
本发明实施例中,状态修改消息中携带有终端的身份标识信息,而服务器中存储着的各个终端的身份标识信息。若状态修改消息中携带的终端的身份标识信息与服务器中存储的终端的身份标识信息能够匹配,则状态修改消息通过合法性验证,执行如图5所示的步骤S504,本发明实施例将状态修改消息转发至上述身份标识信息对应的终端;若不匹配,则状态修改消息未通过合法性验证,相应的,本发明实施例忽略该状态修改消息,不执行任何操作。
当本发明实施例将状态修改消息转发至对应的终端之后,终端无法保证转发该状态 修改消息的服务器为可靠服务器,进而,在服务器侧对状态修改消息进行的验证也就无法被信任。为保证终端接收到的状态修改消息不是恶意服务器发送至终端的状态修改消息,终端对接收到的状态修改消息再次进行合法性验证。当终端接收到状态修改消息之后,本发明实施例判断状态修改消息中携带的终端的标识信息与终端本地存储的身份标识信息是否匹配。若匹配,则该状态修改消息合法,若不匹配,则该状态修改消息不合法。
根据上述对状态修改消息合法性的验证结果,终端执行不同的操作。具体地,若状态修改消息不合法,则忽略该状态修改消息,若状态修改消息合法,则终端获取本身的ID,并返回携带有该硬件ID的状态修改请求。
本发明实施例接收到状态修改请求之后,根据状态修改请求中携带的硬件ID,对状态修改请求进行合法性验证。具体地,当状态修改请求中携带的硬件ID与服务器本地存储的硬件ID能够匹配,则状态修改请求通过合法性验证;若不能够匹配,则状态修改请求无法通过合法性验证。若状态修改请求无法通过合法性验证,本发明实施例忽略状态修改请求,不执行任何操作。若状态修改请求通过合法性验证,则本发明实施例利用服务器对终端的状态信息进行修改,保证服务器中存储的终端的状态信息能够及时更新至终端的当前状态。
本发明实施例中,对状态修改消息的两次合法性验证均通过终端的身份标识,而对状态修改请求的验证,为提高安全性,确定接收到的状态修改请求为合法状态修改请求,本发明实施例使用终端的硬件ID对状态修改请求进行合法性验证。
其中,终端的身份标识信息可以是终端的IMEI,可以是终端的用户ID,还可以是任意能够唯一标识终端的身份标识信息,本发明实施例对此并不加以限定。
终端的硬件ID为汇集多种终端身份标识信息的、综合的身份标识信息。现对该硬件ID的获取进行具体介绍。如上文所述,若状态修改消息合法,则本发明实施例获取上述终端的硬件ID。其中,硬件ID的获取方式与实施例一中的获取方式相同。
本发明实施例中终端的硬件ID通过将终端的IMEI、网卡地址以及CPU的串号进行合并运算能够保证服务器接收的状态修改消息是真实有效可信的,避免接收来自不可信或恶意发送端伪装成终端发送的状态修改消息导致服务器对终端的状态信息进行错误修改。例如,若不可信或恶意发送端伪装成终端发送状态修改消息指示服务器将终端的状态信息从被盗修改为解除被盗。当终端的状态信息修改为解除被盗之后,不法分子可以对终端进行刷机等处理,导致失主无法找回终端的恶劣后果。本发明实施例将接收到的状态修改消息中携带的硬件ID与服务器本地存储的硬件ID进行匹配,若硬件ID匹配,则终端的IMEI、网卡地址以及CPU串号均能够匹配,则能够确定本发明实施例接收到的状态修改消息的合法性。确定状态修改消息的合法性之后,对终端的状态信息进行修改保证服务器存储的终端的状态信息能够及时更新。
本发明实施例中,对终端的状态信息进行修改可以包括修改终端的状态信息为被盗、未被盗或者终端被盗后找回等等。当终端被盗之后,本发明实施例对终端的状态信息进 行及时修改,以便服务器接收到终端的相关信息(如终端的实时位置、终端当前使用者的指纹等)之后,能够向失主提供被盗终端的相关线索,增加失主找回终端的可能性。当终端被盗后找回之后,本发明实施例及时修改终端的状态信息为被盗后找回,服务器也就无需浪费空间等资源查询以及存储终端的相关信息。进一步,本发明实施例的终端的状态信息还可以包括其他更为详细的说明,例如包括终端未出售、终端使用中以及终端被转卖等终端的出售购买状态信息,还可以是其他任意终端的当前状态信息,本发明实施例对此并不加以限定。
本发明实施例中,将终端的状态信息修改为当前状态之后,本发明实施例可以返回修改结果至状态修改消息的发送方。本发明实施例中,对终端的当前状态修改之后,将修改结果发送至发送方,提醒发送方终端的当前状态已修改,进而使得发送方能够根据终端修改后的当前状态执行相应操作。例如,当终端为手机时,用户使用与被盗手机绑定的亲友号码发送状态修改消息至被盗手机,标记手机已被盗。当服务器根据状态修改消息修改手机当前状态为已被盗之后,若返回修改结果至亲友号码,则用户能够及时获知手机已标记被盗,进一步对被盗手机执行其他防盗操作。
本发明实施例还可以在状态修改消息通过合法性验证之后,生成一个执行修改操作的任务ID,并发送该任务ID至状态修改消息发送方。发送方接收到该任务ID之后,确定状态修改消息已经通过服务器的合法性验证。另外,发送方能够随时发送携带有该任务ID的查询请求至服务器,查询服务器的修改操作的执行情况。服务器接收到发送方的查询请求之后,根据查询请求中携带的任务ID确定当前修改操作的执行情况,并返回至发送方。例如,当终端为手机时,若手机丢失,用户能够发送状态修改消息至服务器,并接收到服务器返回的任务ID。根据该任务ID,用户能够随时查询服务器的状态修改操作的执行情况。若因为服务器故障等原因导致当前修改操作无法继续执行,用户能够及时获知操作无法执行的相关信息,并根据获知的相关信息采取相应措施,更加高效率地保护被盗手机的安全。
本发明实施例中,状态修改消息的发送方可以设置于移动终端,例如手机,笔记本电脑等等,并通过短信息或者网络的形式发送状态修改消息。本发明实施例中的发送方还可以设置于终端,例如电脑,并通过网络的形式发送上述状态修改消息。采用本发明实施例,能够及时修改终端的状态信息。例如,当终端被盗之后,用户能够通过各种消息发送平台发送状态修改消息,保证及时标记终端被盗。进一步能够及时获知被盗终端的相关信息,增大被盗终端找回的机率。
现以具体实施例对本发明的被盗终端的处理方法进行进一步说明。
图6示出了根据本发明一个优选实施例的被盗终端的处理方法的处理流程图,用于支持上述任意一个被盗终端的处理方法,将上述被盗终端的处理方法阐述得更加清晰易懂。参见图6,该优选实施例至少包括步骤S602至步骤S628。
需要说明的是,为将本优选实施例阐述得更加简单明白,本优选实施例中,将状态修改消息的发送方设置于亲友手机,将终端设置为被盗终端。其中,亲友手机为被盗手 机绑定的亲友号码所在的手机。
步骤S602、发送状态修改消息,标记手机被盗。
当手机被盗之后,用户使用亲友手机通过网络发送状态修改消息至服务器,标记手机被盗。
步骤S604、判断状态修改请求是否合法。
服务器接收到状态修改消息之后,判断该状态修改消息是否合法。若是,执行步骤S608,若否,执行步骤S606。
步骤S606、状态修改消息不合法,忽略状态修改消息。
步骤S608、发送任务ID至亲友手机。
具体地,当经过服务器判断,状态修改消息合法之后,服务器生成执行修改操作的任务ID,并通过网络发送该任务ID至亲友手机。
步骤S610、转发状态修改消息。
步骤S612、判断状态修改消息是否合法。
服务器验证接收到的状态修改消息合法之后,转发该状态修改消息至被盗手机。被盗手机接收到该状态修改消息之后,再次对该状态修改消息进行合法性验证。若该状态修改消息未通过合法性验证,则执行步骤S614,若通过验证,则执行步骤S616。
步骤S614、当状态修改消息未通过合法性验证,忽略状态修改消息。
步骤S616、当状态修改消息通过合法性验证,被盗手机获取自身的硬件ID。
步骤S618、发送状态修改请求至服务器。
被盗手机获取到自身的硬件ID之后,发送携带有该硬件ID的状态修改请求至服务器。
步骤S620、判断状态修改请求是否合法。
服务器接收到状态修改请求之后,根据状态修改请求中携带的硬件ID判断该状态修改请求是否合法。若不合法,执行步骤S622,若合法,执行步骤S624。
步骤S622、当状态修改请求不合法,服务器忽略状态修改请求。
步骤S624、当状态修改请求合法,执行修改状态信息操作。
步骤S626、发送查询请求。
亲友手机接收到服务器发送的任务ID之后,能够通过网络发送携带有该任务ID的查询请求至服务器,查询服务器的修改操作的执行情况。
步骤S628、发送修改执行情况至亲友手机。
服务器接收到亲友手机发送的查询请求之后,根据查询请求中携带的任务ID获取当前修改操作的执行情况,并将该执行情况通过网络返回至亲友手机。
图7示出了根据本发明另一个优选实施例的被盗终端的处理方法的处理流程图,用于支持上述任意一个被盗终端的处理方法,将上述被盗终端的处理方法阐述得更加清晰易懂。参见图7,该优选实施例至少包括步骤S702至步骤S724。
需要说明的是,为将本优选实施例阐述得更加简单明白,本优选实施例中,将状态 修改消息的发送方设置于亲友手机,将终端设置为被盗终端。其中,亲友手机为被盗手机绑定的亲友号码所在的手机。
步骤S702、发送状态修改消息,标记手机被盗。
当手机被盗之后,用户使用亲友手机通过短信息发送状态修改消息至服务器,标记手机被盗。
步骤S704、判断状态修改请求是否合法。
服务器接收到状态修改消息之后,判断该状态修改消息是否合法。若是,执行步骤S708,若否,执行步骤S706。
步骤S706、状态修改消息不合法,忽略状态修改消息。
步骤S708、转发状态修改消息。
步骤S710、判断状态修改消息是否合法。
服务器验证接收到的状态修改消息合法之后,转发该状态修改消息至被盗手机。被盗手机接收到该状态修改消息之后,再次对该状态修改消息进行合法性验证。若该状态修改消息未通过合法性验证,则执行步骤S712,若通过验证,则执行步骤S714。
步骤S712、当状态修改消息未通过合法性验证,忽略状态修改消息。
步骤S714、当状态修改消息通过合法性验证,被盗手机获取自身的硬件ID。
步骤S716、发送状态修改请求至服务器。
被盗手机获取到自身的硬件ID之后,发送携带有该硬件ID的状态修改请求至服务器。
步骤S718、判断状态修改请求是否合法。
服务器接收到状态修改请求之后,根据状态修改请求中携带的硬件ID判断该状态修改请求是否合法。若不合法,执行步骤S720,若合法,执行步骤S722。
步骤S720、当状态修改请求不合法,服务器忽略状态修改请求。
步骤S722、当状态修改请求合法,执行修改状态信息操作。
步骤S724、通过短信息发送修改执行情况至亲友手机。
请注意,以上S702和S724中的发送步骤也可以通过网络来发送,本发明不限于此。
基于上文各优选实施例提供的被盗终端的处理方法,基于同一发明构思,本发明实施例提供一种服务器,用于实现上述被盗终端的处理方法。
图8示出了根据本发明一个实施例的服务器的结构示意图。参见图8,本发明实施例的服务器至少包括:接收器810、发送器830以及状态修改器840。
现介绍本发明实施例的服务器的各器件或组成的功能以及各部分间的连接关系:
接收器810,配置为接收来自发送方的状态修改消息,其中,状态修改消息中携带有状态发生改变的终端的身份标识信息。
发送器830,与接收器810相耦合,配置为将状态修改消息转发至终端的身份标识信息对应的终端,由终端对其进行验证。
状态修改器840,与接收器810相耦合,配置为根据终端验证状态修改消息通过时返 回的状态修改请求,对终端的状态信息进行修改。
本发明实施例接收来自发送方的状态修改消息,并将其转发至对应的终端,由终端对该状态修改消息进行验证,保证收到的状态修改消息是真实有效可信的消息,避免接收来自不可信或恶意的发送方发送的状态修改消息,导致终端的状态信息被恶意修改。若终端的状态信息被恶意修改,可能导致服务器反馈终端用户的实时位置至恶意发送方,泄露用户信息至恶意发送方,或者可能导致被盗终端被解除被盗标识,进而无法得到被盗终端的相关信息,无法根据被盗终端的相关信息对偷盗者进行抓获。终端验证状态修改消息合法之后,本发明实施例接收终端返回的状态修改请求,并根据该状态修改请求对终端的状态信息进行修改,解决了现有技术中无法提供其他标识说明终端是否被盗的问题。采用本发明实施例提供的被盗终端的处理方法能够更改被盗终端的状态信息。例如,当终端被盗之后,采用本发明实施例能够更改终端的当前状态为已被盗。若偷盗者对被盗终端进行交易,购买者能够查询到终端被盗,进而停止交易并提供偷盗者的线索。因此,采用本发明实施例能够达到增加被盗终端的找回机率并有效遏制偷盗行为的有益效果。
如图8所示的服务器中的接收器810接收来自发送方的状态修改消息,其中,该状态修改消息中携带有状态发生改变的终端的身份标识信息。优选地,为保证接收到的状态修改消息真实有效可信,服务器中判断器820对接收到的状态修改消息进行合法性判断。若经过判断器820的判断,状态修改消息合法,则继续执行防盗操作;若经过判断器820的判断,状态修改消息不合法,则不需要继续执行防盗操作。
本发明实施例中,状态修改消息中携带有终端的身份标识信息,而服务器中存储着的各个终端的身份标识信息。若状态修改消息中携带的终端的身份标识信息与服务器中存储的终端的身份标识信息能够匹配,则判断器820判断状态修改消息通过合法性验证,则由发送器830将状态修改消息转发至上述身份标识信息对应的终端;若不匹配,则判断器820判断状态修改消息未通过合法性验证,相应的,服务器忽略该状态修改消息,不执行任何操作。
当状态修改消息发送至终端之后,终端对该状态修改消息进行合法性验证。若该状态修改消息通过未合法性验证,则终端忽略该状态修改消息。若该状态修改消息通过合法性验证,则终端获取自身的硬件ID,并发送携带有该硬件ID的状态修改请求至如图4所示的服务器。
服务器中的接收器810接收到状态修改请求之后,触发判断器820。判断器820判断该状态修改请求是否合法。本发明实施例中,判断器820通过判断状态修改请求中携带的硬件ID与服务器本地存储的硬件ID是否匹配判断状态修改请求是否合法。若状态修改请求中携带的硬件ID与服务器本地存储的硬件ID不匹配,则判断器820判断该状态修改请求不合法,则服务器忽略该状态修改请求。若状态修改请求中携带的硬件ID与服务器本地存储的硬件ID匹配,则判断器820判断该状态修改请求合法,并触发与其耦合的状态修改器840。状态修改器840根据状态修改请求对终端的状态信息进行修改。
本发明实施例中,状态修改器840对终端的状态信息进行修改可以包括修改终端的状态信息为被盗、未被盗或者终端被盗后找回等等。当终端被盗之后,服务器中的状态修改器840对终端的状态信息进行及时修改,以便服务器接收到终端的相关信息(如终端的实时位置、终端当前使用者的指纹等)之后,能够向失主提供被盗终端的相关线索,增加失主找回终端的可能性。当终端被盗后找回之后,服务器中的状态修改器840及时修改终端的状态信息为被盗后找回,服务器也就无需浪费空间等资源查询以及存储终端的相关信息。进一步,本发明实施例的终端的状态信息还可以包括其他更为详细的说明,例如包括终端未出售、终端使用中以及终端被转卖等终端的出售购买状态信息,还可以是其他任意终端的当前状态信息,本发明实施例对此并不加以限定。
本发明实施例中,状态修改器840将终端的状态信息修改为当前状态之后,触发发送器830。发送器830可以返回修改结果至状态修改消息的发送方。本发明实施例中,发送器830将修改结果发送至发送方,提醒发送方终端的当前状态已修改,进而使得发送方能够根据终端修改后的当前状态执行相应操作。例如,当终端为手机时,用户使用与被盗手机绑定的亲友号码发送状态修改消息至被盗手机,标记手机已被盗。当服务器根据状态修改消息修改手机当前状态为已被盗之后,若返回修改结果至亲友号码,则用户能够及时获知手机已标记被盗,进一步对被盗手机执行其他防盗操作。
本发明实施例还可以在判断器820判断状态修改消息通过合法性验证之后,生成一个执行修改操作的任务ID,并由接收器810发送该任务ID至状态修改消息发送方。发送方接收到该任务ID之后,确定状态修改消息已经通过服务器的合法性验证。另外,发送方能够随时发送携带有该任务ID的查询请求至服务器,查询服务器的修改操作的执行情况。服务器中的接收器810接收到发送方的查询请求之后,根据查询请求中携带的任务ID确定当前修改操作的执行情况,并触发发送器830返回修改操作的执行情况至发送方。例如,当终端为手机时,若手机丢失,用户能够发送状态修改消息至服务器,并接收到服务器返回的任务ID。根据该任务ID,用户能够随时查询服务器的状态修改操作的执行情况。若因为服务器故障等原因导致当前修改操作无法继续执行,用户能够及时获知操作无法执行的相关信息,并根据获知的相关信息采取相应措施,更加高效率地保护被盗手机的安全。
在本实施例中,服务器(参见图8)接收来自发送方的状态修改消息,将其转至对应终端进行身份验证。验证通过时终端向服务器发送状态修改请求,由服务器对其进行修改。即,在本发明实施例中,服务器的功能是用于转发状态修改消息,以及验证通过后根据相应请求修改本地存储的终端的状态信息。当然,为增加安全性,可以对状态修改消息进行进一步验证。
基于上文各优选实施例提供的被盗终端的处理方法及服务器,基于统一发明构思,本发明实施例提供一种被盗终端的处理客户端,用于实现上述被盗终端的处理方法。
图9示出了根据本发明一个实施例的被盗终端的处理客户端的结构示意图。参见图9,本发明实施例的被盗终端的处理客户至少包括:消息接收器910、验证器920以及请 求发送器930。
现介绍本发明实施例的被盗终端的处理客户端的各器件或组成的功能以及各部分间的连接关系:
消息接收器910,配置为接收服务器转发的、来自发送方的状态修改消息。
验证器920,与消息接收器910相耦合,配置为对接收到的状态修改消息进行验证。
请求发送器930,与验证器920相耦合,配置为状态修改消息通过验证之后,返回状态修改请求至服务器,由服务器根据状态修改请求对终端的状态进行修改。
本发明实施例接收来自发送方的状态修改消息,并将其转发至对应的终端,由终端对该状态修改消息进行验证,保证收到的状态修改消息是真实有效可信的消息,避免接收来自不可信或恶意的发送方发送的状态修改消息,导致终端的状态信息被恶意修改。若终端的状态信息被恶意修改,可能导致服务器反馈终端用户的实时位置至恶意发送方,泄露用户信息至恶意发送方,或者可能导致被盗终端被解除被盗标识,进而无法得到被盗终端的相关信息,无法根据被盗终端的相关信息对偷盗者进行抓获。终端验证状态修改消息合法之后,本发明实施例接收终端返回的状态修改请求,并根据该状态修改请求对终端的状态信息进行修改,解决了现有技术中无法提供其他标识说明终端是否被盗的问题。采用本发明实施例提供的被盗终端的处理方法能够更改被盗终端的状态信息。例如,当终端被盗之后,采用本发明实施例能够更改终端的当前状态为已被盗。若偷盗者对被盗终端进行交易,购买者能够查询到终端被盗,进而停止交易并提供偷盗者的线索。因此,采用本发明实施例能够达到增加被盗终端的找回机率并有效遏制偷盗行为的有益效果。
如图9所示的客户端中的消息接收器910接收到服务器转发的、来自发送方的状态修改消息之后,触发验证器920。为保证接收到的状态修改消息不是非恶意服务器发送的状态修改消息,验证器920根据状态修改消息中携带的终端的身份标识信息对状态修改消息进行合法性验证。若经过验证器920的验证,状态修改消息中携带的终端的身份标识信息与终端本地存储的身份标识信息匹配,则状态修改消息合法。若经过验证器920的验证,状态修改消息中携带的终端的身份标识信息与终端本地存储的身份标识信息不匹配,则状态修改消息不合法。
如上文所述,验证器920验证消息接收器910接收到的状态修改消息是否合法,并根据验证结果执行下一步操作。具体地,若状态修改消息不合法,则如图9所示的客户端忽略该状态修改消息,不执行任何操作。若状态修改消息合法,则验证器920触发请求发送器930。请求发送器930获取终端的硬件ID,并发送携带有该硬件ID的状态修改请求至服务器。
请求发送器930发送状态修改请求至服务器之前,从与其耦合的计算器940处获取终端的硬件ID。现对该硬件ID的获取进行具体介绍。如上文所述,验证器920验证状态修改消息合法之后,由请求发送器930获取作为终端的身份标识信息的硬件ID。本发明实施中,请求发送器930触发计算器940,由计算器940计算终端的硬件ID。具体地, 计算器940首先获取终端的IMEI,记为第一字符串。其次,计算器940获取被盗移动终端的网卡地址,并去除网卡地址中的非字母以及非数字字符,去除后的网卡地址记为第二字符串。计算器940获取到第一字符串以及第二字符串之后,获取终端的CPU串号,记为第三字符串。获取到第一、第二以及第三字符串之后,计算器940按预定顺序合并上述三个字符串。其中,该预定顺序可以是按第一、第二、第三的顺序合并上述三个字符串,可以是按第三、第二、第一的倒序合并上述三个字符串,还可以是其他预定的顺序,本发明实施例对此并不加以限定。
合并上述字符串之后,计算器940将合并后得到的结果转换为大写格式,并记为第一结果。获取到第一结果之后,计算器940将该第一结果进行MD5运算,得到第二结果。之后,计算器940将该第二结果转换为大写格式得到终端的硬件ID。
本发明实施例中终端的硬件ID通过将终端的IMEI、网卡地址以及CPU的串号进行合并运算能够保证服务器接收的状态修改消息是真实有效可信的,避免接收来自不可信或恶意发送端伪装成终端发送的状态修改消息导致服务器对终端的状态信息进行错误修改。例如,若不可信或恶意发送端伪装成终端发送状态修改消息指示服务器将终端的状态信息从被盗修改为解除被盗。当终端的状态信息修改为解除被盗之后,不法分子可以对终端进行刷机等处理,导致失主无法找回终端的恶劣后果。本发明实施例将接收到的状态修改消息中携带的硬件ID与服务器本地存储的硬件ID进行匹配,若硬件ID匹配,则终端的IMEI、网卡地址以及CPU串号均能够匹配,则能够确定本发明实施例接收到的状态修改消息的合法性。确定状态修改消息的合法性之后,对终端的状态信息进行修改保证服务器存储的终端的状态信息能够及时更新。
在本实施例中,被盗终端的处理客户端(参见图9)能够接收来自服务器方的状态修改消息,并对其进行验证。当验证通过时,发送该状态修改请求转发至服务器。即,本实施例中,被盗终端的处理客户端的功能为验证状态修改消息的合法性。
根据上述任意一个优选实施例或多个优选实施例的组合,本发明实施例能够达到如下有益效果:
本发明实施例接收来自发送方的状态修改消息,并将其转发至对应的终端,由终端对该状态修改消息进行验证,保证收到的状态修改消息是真实有效可信的消息,避免接收来自不可信或恶意的发送方发送的状态修改消息,导致终端的状态信息被恶意修改。若终端的状态信息被恶意修改,可能导致服务器反馈终端用户的实时位置至恶意发送方,泄露用户信息至恶意发送方,或者可能导致被盗终端被解除被盗标识,进而无法得到被盗终端的相关信息,无法根据被盗终端的相关信息对偷盗者进行抓获。终端验证状态修改消息合法之后,本发明实施例接收终端返回的状态修改请求,并根据该状态修改请求对终端的状态信息进行修改,解决了现有技术中无法提供其他标识说明终端是否被盗的问题。采用本发明实施例提供的被盗终端的处理方法能够更改被盗终端的状态信息。例如,当终端被盗之后,采用本发明实施例能够更改终端的当前状态为已被盗。若偷盗者对被盗终端进行交易,购买者能够查询到终端被盗,进而停止交易并提供偷盗者的线索。 因此,采用本发明实施例能够达到增加被盗终端的找回机率并有效遏制偷盗行为的有益效果。
实施例三
本实施例提供了一种被盗终端的处理方法。图10示出了根据本发明一个实施例的被盗终端的处理方法的处理流程图。如图10所示,该流程至少包括步骤S1002至步骤S1006。
步骤S1002、接收来自发送方的状态修改消息,其中,状态修改消息中携带有终端的身份标识信息以及终端的当前状态。
步骤S1004、利用服务器对状态修改消息进行合法性验证。
步骤S1006、根据通过合法性验证的状态修改消息修改身份标识信息对应的终端的状态信息至当前状态。
本发明实施例接收来自发送方的状态修改消息,并对该状态修改消息进行验证,保证收到的状态修改消息是真实有效可信的消息,避免接收来自不可信或恶意的发送方发送的状态修改消息,导致终端的状态信息被恶意修改。若终端的状态信息被恶意修改,可能导致服务器反馈终端用户的实时位置至恶意发送方,泄露用户信息至恶意发送方,或者可能导致被盗终端被解除被盗标识,进而无法得到被盗终端的相关信息,无法根据被盗终端的相关信息对偷盗者进行抓获。状态修改消息通过合法性验证之后,本发明实施例根据该状态修改消息对终端的状态信息进行修改,解决了现有技术中无法提供其他标识说明终端是否被盗的问题。采用本发明实施例提供的被盗终端的处理方法能够更改被盗终端的状态信息。例如,当终端被盗之后,采用本发明实施例能够更改终端的当前状态为已被盗。若偷盗者对被盗终端进行交易,购买者能够查询到终端被盗,进而停止交易并提供偷盗者的线索。因此,采用本发明实施例能够达到增加被盗终端的找回机率并有效遏制偷盗行为的有益效果。
如图10中的步骤S1002以及步骤S1004所示,接收到来自发送方的状态修改消息之后,为保证接收的状态修改消息是真实有效可信的,避免接收来自不可信或恶意发送端发送的状态修改消息导致服务器对终端的状态信息进行错误修改,本发明实施例利用服务器对状态修改消息进行合法性验证。
上文提及,来自发送方的状态修改消息中携带有终端的身份标识信息,本发明实施例利用该终端的身份标识信息与服务器本地存储的身份标识信息是否匹配对状态修改消息的合法性进行验证。具体地,若状态修改消息中携带的终端的身份标识信息与服务器本地存储的身份标识信息能够匹配,则状态修改消息合法;若状态修改消息中携带的终端的身份标识信息与服务器本地存储的身份标识信息不能够匹配,则状态修改消息不合法。
根据对状态修改消息的验证结果,本发明实施例执行不同的操作。若状态修改消息不合法,则本发明实施例无法保证服务器接收到的状态修改消息是真实有效可信的,并且无法保证状态修改消息的发送方不是不可信或恶意发送端。因此,当经本发明实施例 验证,状态修改消息不合法时,为保证服务器不会根据来自不可信方的状态修改消息对终端的状态信息进行错误修改,本发明实施例忽略接收到的状态修改信息,不执行任何操作。
若状态修改消息合法,则本发明实施例根据状态修改消息中携带的终端的标识信息确定该标识信息对应的终端。确定对应的终端之后,本发明实施例根据状态修改消息中该终端的当前状态对服务器本地存储的终端的状态信息进行对应修改,保证服务器存储的终端的状态信息能够得到及时更新。
本发明实施例中,终端的当前状态可以包括终端被盗以及终端未被盗、终端被盗后找回等等。当终端被盗之后,本发明实施例对终端的状态信息进行及时修改,以便服务器接收到终端的相关信息(如终端的实时位置、终端当前使用者的指纹等)之后,能够向失主提供被盗终端的相关线索,增加失主找回终端的可能性。当终端被盗后找回之后,本发明实施例及时修改终端的状态为被盗后找回,服务器也就无需浪费空间等资源查询以及存储终端的相关信息。进一步,本发明实施例的终端的当前状态还可以包括其他更为详细的说明,例如包括终端未出售、终端使用中以及终端被转卖等终端的出售购买状态信息,还可以是其他任意终端的当前状态信息,本发明实施例对此并不加以限定。
优选地,将终端的状态信息修改为当前状态之后,本发明实施例返回修改结果至状态修改信息的发送方。本发明实施例中,对终端的当前状态修改之后,将修改结果发送至发送方,提醒发送方该终端的当前状态已修改,进而使得发送方能够根据终端修改后的当前状态执行相应操作。例如,当终端为手机时,用户使用与被盗手机绑定的亲友号码发送状态修改消息至被盗手机,标记手机已被盗。当服务器根据状态修改消息修改手机当前状态为已被盗之后,若返回修改结果至亲友号码,则用户能够及时获知手机已标记被盗,进一步对被盗手机执行其他防盗操作。
本发明实施例中,终端的身份标识信息可以是终端的IMEI,可以是终端的ID,还可以是任意能够唯一标识终端的身份标识信息,本发明实施例对此并不加以限定。
为提高终端的安全性,确定接收到的状态修改消息为合法状态修改消息,优选地,本发明实施例提供一种终端身份标识。该终端身份标识为终端的硬件ID。由于硬件ID的获取包括了对终端的IMEI、终端的网卡地址以及终端的CPU串号进行的综合运算,因此,硬件ID是终端的一个综合的身份标识。将硬件ID作为终端的身份标识对状态修改消息进行合法性验证,若状态修改消息通过验证,则表明状态修改消息中携带的终端的IMEI、终端的网卡地址以及终端的CPU串号均通过验证,对状态修改消息的合法性有了更高的保证。其中,硬件ID的计算方法请参见实施例一。
另外,本发明实施例中,状态修改消息的发送方可以设置于移动终端,例如手机,笔记本电脑等等,并通过短信息或者网络的形式发送状态修改消息。本发明实施例中的发送方还可以设置于终端,例如电脑,并通过网络的形式发送上述状态修改消息。采用本发明实施例,能够及时修改终端的状态信息。例如,当终端被盗之后,用户能够通过各种消息发送平台发送状态修改消息,保证及时标记终端被盗。进一步能够及时获知被 盗终端的相关信息,增大被盗终端找回的机率。
现以具体实施例对本发明的被盗终端的处理方法进行进一步说明。
图11示出了根据本发明一个优选实施例的被盗终端的处理方法的处理流程图,支持上述任意一个被盗终端的处理方法,将上述被盗终端的处理方法阐述得更加清晰易懂。参见图11,该流程至少包括步骤S1102至步骤S1110。
需要说明的是,为将本优选实施例阐述得更加简单明白,本优选实施例中,将状态修改消息的发送方设置于亲友手机,将终端设置为被盗手机,其中,亲友手机为被盗手机绑定的亲友号码所在的手机。
步骤S1102、发送状态修改消息,标记手机被盗。
具体地,用户发现手机被盗之后,能够通过预先与被盗手机绑定的亲友号码的手机发送状态修改消息至服务器。使用亲友手机时,本优选实施例能够通过短信息发送该状态修改信息至服务器。并且,发送至服务器的状态修改消息中携带有被盗手机的身份标识信息。
步骤S1104、判断状态修改消息是否合法。
服务器接收到状态修改消息之后,对该状态修改消息进行合法性验证。若状态修改消息中携带的身份标识信息与服务器本地存储的身份标识信息不能够匹配,则服务器判断状态修改消息不能通过合法性验证,则执行步骤S1106。若状态修改消息中携带的身份标识信息与服务器本地存储的身份标识信息能够匹配,则服务器判断状态修改消息通过合法性验证,则执行步骤S1108。
步骤S1106、状态修改消息未通过合法性验证,服务器忽略状态修改消息。
步骤S1108、状态修改消息通过合法性验证,服务器根据状态修改消息修改被盗手机的状态信息。
当服务器判断状态修改消息通过验证之后,服务器根据该状态修改消息修改被盗手机的状态信息为手机已被盗。
步骤S1110、返回修改结果。
服务器对被盗手机的状态信息修改完毕之后,通过短信息发送修改结果至状态修改消息的发送方,即本优选实施例中的亲友手机或个人电脑。状态修改消息的发送方接收到服务器返回的修改结果之后,确定已成功标记手机被盗。
图12示出了根据本发明另一个优选实施例的被盗终端的处理方法的处理流程图,永远支持上述任意一个被盗终端的处理方法,将上述被盗终端的处理方法阐述得更加清晰易懂。参见图12,该流程至少包括步骤S1202至步骤S1210。
需要说明的是,为将本优选实施例阐述得更加简单明白,本优选实施例中,将状态修改消息的发送方设置于个人电脑,将终端设置为被盗手机。
步骤S1202、发送状态修改消息,标记手机被盗。
具体地,用户发现手机被盗之后,能够通过个人电脑发送状态修改消息至服务器。使用个人电脑时,本优选实施例能够通过网络发送状态修改消息至服务器。并且,发送 至服务器的状态修改消息中携带有被盗手机的身份标识信息。
步骤S1204、判断状态修改消息是否合法。
服务器接收到状态修改消息之后,对该状态修改消息进行合法性验证。若状态修改消息中携带的身份标识信息与服务器本地存储的身份标识信息不能够匹配,则服务器判断状态修改消息不能通过合法性验证,则执行步骤S1206。若状态修改消息中携带的身份标识信息与服务器本地存储的身份标识信息能够匹配,则服务器判断状态修改消息通过合法性验证,则执行步骤S1208。
步骤S1206、状态修改消息未通过合法性验证,服务器忽略状态修改消息。
步骤S1208、状态修改消息通过合法性验证,服务器根据状态修改消息修改被盗手机的状态信息。
当服务器判断状态修改消息通过验证之后,服务器根据该状态修改消息修改被盗手机的状态信息为手机已被盗。
步骤S1210、返回修改结果。
服务器对被盗手机的状态信息修改完毕之后,通过网络发送修改结果至状态修改消息的发送发,即本优选实施例中的亲友手机或个人电脑。状态修改消息的发送方接收到服务器返回的修改结果之后,确定已成功标记手机被盗。
图13示出了根据本发明又一个优选实施例的被盗终端的处理方法的处理流程图,支持上述任意一个被盗终端的处理方法,将上述被盗终端的处理方法阐述得更加清晰易懂。参见图13,该流程至少包括步骤S1302至步骤S1310。
需要说明的是,为将本优选实施例阐述得更加简单明白,本优选实施例中,将状态修改消息的发送方设置于亲友手机,将终端设置为被盗手机,其中,亲友手机为被盗手机绑定的亲友号码所在的手机。
步骤S1302、发送状态修改消息,标记手机被盗。
具体地,用户发现手机被盗之后,能够通过预先与被盗手机绑定的亲友号码的手机发送状态修改消息至服务器。使用亲友手机时,本优选实施例能够通过网络发送该状态修改信息至服务器。并且,发送至服务器的状态修改消息中携带有被盗手机的身份标识信息。
步骤S1304、判断状态修改消息是否合法。
服务器接收到状态修改消息之后,对该状态修改消息进行合法性验证。若状态修改消息中携带的身份标识信息与服务器本地存储的身份标识信息不能够匹配,则服务器判断状态修改消息不能通过合法性验证,则执行步骤S1306。若状态修改消息中携带的身份标识信息与服务器本地存储的身份标识信息能够匹配,则服务器判断状态修改消息通过合法性验证,则执行步骤S1308。
步骤S1306、状态修改消息未通过合法性验证,服务器忽略状态修改消息。
步骤S1308、状态修改消息通过合法性验证,服务器根据状态修改消息修改被盗手机的状态信息。
当服务器判断状态修改消息通过验证之后,服务器根据该状态修改消息修改被盗手机的状态信息为手机已被盗。
步骤S1310、返回修改结果。
服务器对被盗手机的状态信息修改完毕之后,通过网络发送修改结果至状态修改消息的发送方,即本优选实施例中的亲友手机或个人电脑。状态修改消息的发送方接收到服务器返回的修改结果之后,确定已成功标记手机被盗。
基于上文各优选实施例提供的被盗终端的处理方法,基于同一发明构思,本发明实施例提供了一种服务器,用于实现上述被盗终端的处理方法。
图14示出了根据本发明一个实施例的服务器的结构示意图。参见图14,本发明实施例的服务器至少包括:接收器1410、判断器1420以及状态修改器1430。
现介绍本发明实施例的服务器的各器件或组成的功能以及各部分间的连接关系:
接收器1410,配置为接收来自发送方的状态修改消息,其中,所述状态修改消息中携带有终端的身份标识信息以及终端的当前状态。
判断器1420,与接收器1410相耦合,配置为判断状态修改消息是否通过合法性验证。
状态修改器1430,与判断器1420相耦合,配置为根据通过合法性验证的状态修改消息修改身份标识信息对应的终端的状态信息至当前状态。
本发明实施例接收来自发送方的状态修改消息,并对该状态修改消息进行验证,保证收到的状态修改消息是真实有效可信的消息,避免接收来自不可信或恶意的发送方发送的状态修改消息,导致终端的状态信息被恶意修改。若终端的状态信息被恶意修改,可能导致服务器反馈终端用户的实时位置至恶意发送方,泄露用户信息至恶意发送方,或者可能导致被盗终端被解除被盗标识,进而无法得到被盗终端的相关信息,无法根据被盗终端的相关信息对偷盗者进行抓获。状态修改消息通过合法性验证之后,本发明实施例根据该状态修改消息对终端的状态信息进行修改,解决了现有技术中无法提供其他标识说明终端是否被盗的问题。采用本发明实施例提供的被盗终端的处理方法能够更改被盗终端的状态信息。例如,当终端被盗之后,采用本发明实施例能够更改终端的当前状态为已被盗。若偷盗者对被盗终端进行交易,购买者能够查询到终端被盗,进而停止交易并提供偷盗者的线索。因此,采用本发明实施例能够达到增加被盗终端的找回机率并有效遏制偷盗行为的有益效果。
如图14所示的服务器,接收器1410接收来自发送方的状态修改消息,其中,该状态修改消息中携带有状态信息发生改变的终端的身份标识。接收器1410接收到来自发送方的状态修改消息之后,为保证接受的状态修改消息是真实有效可信的,避免接收来自不可信或恶意发送端发送的状态修改消息导致服务器对终端的状态信息进行错误修改,接收器1410触发判断器1420。判断器1420受到触发之后,对状态修改消息能够通过合法性进行判断。具体地,若状态修改消息中携带的终端的身份标识信息与服务器本地存储的终端的身份标识信息能够匹配,则判断器1420判断状态修改消息通过合法性验证。若状态修改消息中携带的终端的身份标识信息与服务器本地存储的终端的身份标识信息 不能够匹配,则判断器1420判断状态修改消息未通过合法性验证。
判断器1420对接收器1410接收到的状态修改消息进行验证之后,若状态修改消息未通过验证,则服务器无法保证服务器接收到的状态修改消息是真实有效可信的,并且无法保证状态修改消息的发送方不是不可信或恶意发送端。因此,判断器1420判断状态验证信息不合法时,为保证服务器不会根据来自不可信方的状态修改消息对终端的状态信息进行错误修改,服务器忽略该状态修改消息,不执行任何操作。若判断器1420判断状态修改消息合法,则触发与判断器1420耦合的状态修改器1430。状态修改器收到触发之后,根据状态修改消息中携带的终端的身份标识信息确定对应的终端。终端确定之后,状态修改器1420根据状态修改消息对服务器本地存储的终端的状态信息进行修改,保证对终端的状态信息进行及时更新。
本发明实施例中,终端的当前状态可以包括终端被盗以及终端未被盗、终端被盗后找回等等。当终端被盗之后,状态修改器1420对终端的状态信息进行及时修改,以便服务器接收到终端的相关信息(如终端的实时位置、终端当前使用者的指纹等)之后,能够向失主提供被盗终端的相关线索,增加失主找回终端的可能性。当终端被盗后找回之后,服务器中的状态修改器1420及时修改终端的状态为被盗后找回,服务器也就无需浪费空间等资源查询以及存储终端的相关信息。进一步,本发明实施例的终端的当前状态还可以包括其他更为详细的说明,例如包括终端未出售、终端使用中以及终端被转卖等终端的出售购买状态信息,还可以是其他任意终端的当前状态信息,本发明实施例对此并不加以限定。
优选地,状态修改器1420将终端的状态信息修改为当前状态之后,触发发送器1440。发送器1440返回修改结果状态修改信息的发送方。本发明实施例中,对终端的当前状态修改之后,由发送器1440将修改结果发送至发送方,提醒发送方该终端的当前状态已修改,进而使得发送方能够根据终端修改后的当前状态执行相应操作。例如,当终端为手机时,用户使用与被盗手机绑定的亲友号码发送状态修改消息至被盗手机,标记手机已被盗。当服务器根据状态修改消息修改手机当前状态为已被盗之后,若返回修改结果至亲友号码,则用户能够及时获知手机已标记被盗,进一步对被盗手机执行其他防盗操作。
本发明实施例中,终端的身份标识信息可以是终端的IMEI,可以是终端的用户ID,还可以是任意能够唯一标识终端的身份标识信息,本发明实施例对此并不加以限定。
为提高终端的安全性,确定接收到的状态修改消息为合法状态修改消息,优选地,本发明实施例提供一种终端身份标识。该终端身份标识为终端的硬件ID。由于硬件ID的获取包括了对终端的IMEI、终端的网卡地址以及终端的CPU串号进行的综合运算,因此,硬件ID是终端的一个综合的身份标识。将硬件ID作为终端的身份标识对状态修改消息进行合法性验证,若状态修改消息通过验证,则表明状态修改消息中携带的终端的IMEI、终端的网卡地址以及终端的CPU串号均通过验证,对状态修改消息的合法性有了更高的保证。其中硬件ID的计算方式请参见实施例一。
另外,本发明实施例中,状态修改消息的发送方可以设置于移动终端,例如手机, 笔记本电脑等等,并通过短信息或者网络的形式发送状态修改消息。本发明实施例中的发送方还可以设置于终端,例如电脑,并通过网络的形式发送上述状态修改消息。采用本发明实施例,能够及时修改终端的状态信息。例如,当终端被盗之后,用户能够通过各种消息发送平台发送状态修改消息,保证及时标记终端被盗。进一步能够及时获知被盗终端的相关信息,增大被盗终端找回的机率。
在本实施例中,服务器(参见图14)接收来自发送方的状态修改消息,对其进行身份验证,在验证通过时对其进行修改。即,在本发明实施例中,服务器的功能是用于验证状态修改消息,以及验证通过后根据相应请求修改本地存储的终端的状态信息。
根据上述任意一个优选实施例或多个优选实施例的组合,本发明实施例能够达到如下有益效果:
本发明实施例接收来自发送方的状态修改消息,并对该状态修改消息进行验证,保证收到的状态修改消息是真实有效可信的消息,避免接收来自不可信或恶意的发送方发送的状态修改消息,导致终端的状态信息被恶意修改。若终端的状态信息被恶意修改,可能导致服务器反馈终端用户的实时位置至恶意发送方,泄露用户信息至恶意发送方,或者可能导致被盗终端被解除被盗标识,进而无法得到被盗终端的相关信息,无法根据被盗终端的相关信息对偷盗者进行抓获。状态修改消息通过合法性验证之后,本发明实施例根据该状态修改消息对终端的状态信息进行修改,解决了现有技术中无法提供其他标识说明终端是否被盗的问题。采用本发明实施例提供的被盗终端的处理方法能够更改被盗终端的状态信息。例如,当终端被盗之后,采用本发明实施例能够更改终端的当前状态为已被盗。若偷盗者对被盗终端进行交易,购买者能够查询到终端被盗,进而停止交易并提供偷盗者的线索。因此,采用本发明实施例能够达到增加被盗终端的找回机率并有效遏制偷盗行为的有益效果。
在此处所提供的说明书中,说明了大量具体细节。然而,能够理解,本发明的实施例可以在没有这些具体细节的情况下实践。在一些实例中,并未详细示出公知的方法、结构和技术,以便不模糊对本说明书的理解。
类似地,应当理解,为了精简本公开并帮助理解各个发明方面中的一个或多个,在上面对本发明的示例性实施例的描述中,本发明的各个特征有时被一起分组到单个实施例、图、或者对其的描述中。然而,并不应将该公开的方法解释成反映如下意图:即所要求保护的本发明要求比在每个权利要求中所明确记载的特征更多的特征。更确切地说,如下面的权利要求书所反映的那样,发明方面在于少于前面公开的单个实施例的所有特征。因此,遵循具体实施方式的权利要求书由此明确地并入该具体实施方式,其中每个权利要求本身都作为本发明的单独实施例。
本领域那些技术人员可以理解,可以对实施例中的设备中的模块进行自适应性地改变并且把它们设置在与该实施例不同的一个或多个设备中。可以把实施例中的模块或单元或组件组合成一个模块或单元或组件,以及此外可以把它们分成多个子模块或子单元或子组件。除了这样的特征和/或过程或者单元中的至少一些是相互排斥之外,可以采用 任何组合对本说明书(包括伴随的权利要求、摘要和附图)中公开的所有特征以及如此公开的任何方法或者设备的所有过程或单元进行组合。除非另外明确陈述,本说明书(包括伴随的权利要求、摘要和附图)中公开的每个特征可以由提供相同、等同或相似目的的替代特征来代替。
此外,本领域的技术人员能够理解,尽管在此所述的一些实施例包括其它实施例中所包括的某些特征而不是其它特征,但是不同实施例的特征的组合意味着处于本发明的范围之内并且形成不同的实施例。例如,在下面的权利要求书中,所要求保护的实施例的任意之一都可以以任意的组合方式来使用。
本发明的各个部件实施例可以以硬件实现,或者以在一个或者多个处理器上运行的软件模块实现,或者以它们的组合实现。本领域的技术人员应当理解,可以在实践中使用微处理器或者数字信号处理器(DSP)来实现根据本发明实施例的多个设备中的一些或者全部部件的一些或者全部功能。本发明还可以实现为用于执行这里所描述的方法的一部分或者全部的设备或者装置程序(例如,计算机程序和计算机程序产品)。这样的实现本发明的程序可以存储在计算机可读介质上,或者可以具有一个或者多个信号的形式。这样的信号可以从因特网网站上下载得到,或者在载体信号上提供,或者以任何其他形式提供。
例如,图15示出了可以实现根据本发明的被盗终端的处理方法的计算设备。该计算设备传统上包括处理器1510和以存储器1520形式的计算机程序产品或者计算机可读介质。存储器1520可以是诸如闪存、EEPROM(电可擦除可编程只读存储器)、EPROM、硬盘或者ROM之类的电子存储器。存储器1520具有用于执行上述方法中的任何方法步骤的程序代码1531的存储空间1530。例如,用于程序代码的存储空间1530可以包括分别用于实现上面的方法中的各种步骤的各个程序代码1531。这些程序代码可以从一个或者多个计算机程序产品中读出或者写入到这一个或者多个计算机程序产品中。这些计算机程序产品包括诸如硬盘,紧致盘(CD)、存储卡或者软盘之类的程序代码载体。这样的计算机程序产品通常为如参考图16所述的便携式或者固定存储单元。该存储单元可以具有与图15的计算设备中的存储器1520类似布置的存储段、存储空间等。程序代码可以例如以适当形式进行压缩。通常,存储单元包括计算机可读代码1531’,即可以由例如诸如1510之类的处理器读取的代码,这些代码当由计算设备运行时,导致该计算设备执行上面所描述的方法中的各个步骤。
本文中所称的“一个实施例”、“实施例”或者“一个或者多个实施例”意味着,结合实施例描述的特定特征、结构或者特性包括在本发明的至少一个实施例中。此外,请注意,这里“在一个实施例中”的词语例子不一定全指同一个实施例。
应该注意的是上述实施例对本发明进行说明而不是对本发明进行限制,并且本领域技术人员在不脱离所附权利要求的范围的情况下可设计出替换实施例。在权利要求中,不应将位于括号之间的任何参考符号构造成对权利要求的限制。单词“包含”不排除存在未列在权利要求中的元件或步骤。位于元件之前的单词“一”或“一个”不排除存在 多个这样的元件。本发明可以借助于包括有若干不同元件的硬件以及借助于适当编程的计算机来实现。在列举了若干装置的单元权利要求中,这些装置中的若干个可以是通过同一个硬件项来具体体现。单词第一、第二、以及第三等的使用不表示任何顺序。可将这些单词解释为名称。
此外,还应当注意,本说明书中使用的语言主要是为了可读性和教导的目的而选择的,而不是为了解释或者限定本发明的主题而选择的。因此,在不偏离所附权利要求书的范围和精神的情况下,对于本技术领域的普通技术人员来说许多修改和变更都是显而易见的。对于本发明的范围,对本发明所做的公开是说明性的,而非限制性的,本发明的范围由所附权利要求书限定。

Claims (53)

  1. 一种被盗终端的处理方法,包括:
    接收来自发送方的状态修改消息,其中,所述状态修改消息中携带有本终端的当前状态;
    在所述状态修改消息合法的情况下,将所述状态修改消息转发至服务器,由所述服务器根据所述状态修改消息将所述服务器中存储的本终端的状态信息修改为所述当前状态。
  2. 根据权利要求1所述的方法,其中,将所述状态修改消息转发至服务器之后,还包括:
    接收所述服务器返回的对本终端的状态信息的修改结果;
    发送所述修改结果至所述发送方。
  3. 根据权利要求1或2所述的方法,其中,按如下步骤判断所述状态修改消息是否合法,包括:
    判断所述发送方与本终端存储的可信任号码是否匹配;
    若所述发送方与本终端存储的可信任号码不匹配,则所述状态修改消息不合法;
    若所述发送方与本终端存储的可信任号码匹配,则所述状态修改消息合法。
  4. 根据权利要求3所述的方法,其中,判断所述状态修改消息是否合法之后,还包括:
    若所述状态修改消息不合法,则忽略所述状态修改消息;
    若所述状态修改消息合法,则获取本终端的身份标识信息;
    将携带有所述身份标识信息的所述状态修改消息转发至所述服务器。
  5. 根据权利要求4所述的方法,其中,将携带有所述身份标识信息的所述状态修改消息转发至所述服务器之后,还包括:
    利用所述服务器判断所述状态修改消息中携带的身份标识信息与所述服务器中存储的身份标识信息是否匹配;
    若所述状态修改消息中携带的身份标识信息与所述服务器中存储的身份标识信息均不匹配,则忽略所述状态修改消息;
    若所述状态修改消息中携带的身份标识信息与所述服务器中存储的身份标识信息匹配,则触发所述服务器中的状态信息修改操作。
  6. 根据权利要求4或5所述的方法,其中,所述身份标识信息至少包括下列任意之一:
    本终端的国际移动设备身份码IMEI;
    本终端的用户身份标识码ID;
    本终端的硬件身份标识码ID。
  7. 根据权利要求6所述的方法,其中,按如下步骤计算所述硬件ID:
    获取本终端的IMEI,记为第一字符串;
    获取本终端的网卡地址,将去除所述网卡地址中的非字母以及非数字字符的字符串记为第二字符串;
    获取本终端的中央处理器CPU的串号,记为第三字符串;
    按预定顺序合并所述第一字符串、所述第二字符串以及所述第三字符串,并转换合并后的字符串至大写格式,记为第一结果;
    将所述第一结果进行消息摘要算法MD5运算得到第二结果;
    转换所述第二结果至大写格式,得到所述硬件ID。
  8. 根据权利要求1至7任一项所述的方法,其中,所述发送方设置于移动终端。
  9. 一种被盗终端的处理客户端,包括:
    接收器,配置为接收来自发送方的状态修改消息,其中,所述状态修改消息中携带有终端的当前状态;
    合法判断器,配置为判断所述状态修改消息是否合法;
    发送器,配置为在所述状态修改消息合法的情况下,将所述状态修改消息转发至服务器,由所述服务器根据所述状态修改消息将所述服务器中存储的所述终端的状态信息修改为所述当前状态。
  10. 根据权利要求9所述的客户端,其中,还包括:
    所述接收器还配置为,所述发送器将所述状态修改消息转发至服务器之后,接收所述服务器返回的对所述终端的状态信息的修改结果;以及
    所述发送器还配置为,发送所述修改结果至所述发送方。
  11. 根据权利要求9或10所述的客户端,其中,所述合法判断器还配置:
    判断所述发送方与所述终端存储的可信任号码是否匹配;
    若所述发送方与所述终端存储的可信任号码不匹配,则判断所述状态修改消息不合法;
    若所述发送方与所述终端存储的可信任号码匹配,则判断所述状态修改消息合法。
  12. 根据权利要求11所述的客户端,其中,所述发送器还配置为:
    若所述状态修改消息不合法,则忽略所述状态修改消息;
    若所述状态修改消息合法,则获取所述终端的身份标识信息,并将携带有所述身份标识信息的所述状态修改消息转发至所述服务器。
  13. 根据权利要求12所述的客户端,其中,所述身份标识信息至少包括下列任意之一:
    所述终端的国际移动设备身份码IMEI;
    所述终端的用户身份标识码ID;
    所述终端的硬件身份码ID。
  14. 根据权利要求13所述的客户端,其中,还包括:
    计算器,配置为按如下步骤计算所述终端的硬件ID:
    获取所述终端的IMEI,记为第一字符串;
    获取所述终端的网卡地址,将去除所述网卡地址中的非字母以及非数字字符的字符串记为第二字符串;
    获取所述终端的中央处理器CPU的串号,记为第三字符串;
    按预定顺序合并所述第一字符串、所述第二字符串以及所述第三字符串,并转换合并后的字符串至大写格式,记为第一结果;
    将所述第一结果进行消息摘要算法MD5运算得到第二结果;
    转换所述第二结果至大写格式,得到所述终端的硬件ID。
  15. 一种服务器,包括:
    命令接收器,配置为接收终端发送的状态修改消息,其中,所述状态修改消息中携带有所述终端的当前状态以及所述终端的身份标识信息;
    状态修改器,配置为根据所述状态修改消息将本服务器中存储的所述终端的状态信息修改为所述当前状态。
  16. 根据权利要求15所述的服务器,其中,还包括:
    判断器,配置为所述命令接收器接收所述状态修改消息之后,判断所述终端的身份标识信息与本服务器中存储的身份标识信息是否匹配;
    若不匹配,则判断所述状态修改消息不合法;
    若匹配,则判断所述状态修改消息合法。
  17. 根据权利要求16所述的服务器,其中,所述状态修改器还配置为:
    若所述状态修改消息不合法,则忽略所述状态修改消息;
    若所述状态修改消息合法,则将所述终端的状态信息修改为所述当前状态。
  18. 根据权利要求15至17任一项所述的服务器,其中,还包括:
    结果发送器,配置为所述状态修改器将所述终端的状态信息修改为所述当前状态之后,发送修改结果至所述终端。
  19. 根据权利要求15至18任一项所述的服务器,其中,所述身份标识信息至少包括下列任意之一:
    所述终端的国际移动设备身份码IMEI;
    所述终端的用户身份标识码ID;
    所述终端的硬件身份标识码ID。
  20. 一种被盗终端的处理方法,包括:
    接收来自发送方的状态修改消息,其中,所述状态修改消息中携带有状态发生改变的终端的身份标识信息;
    将所述状态修改消息转发至所述终端的身份标识信息对应的终端,由所述终端对其进行验证;
    根据所述终端验证所述状态修改消息通过时返回的状态修改请求,对所述终端的状态信息进行修改。
  21. 根据权利要求20所述的方法,其中,所述接收来自发送方的状态修改消息之后,还包括:
    判断所述状态修改消息中携带的所述终端的身份标识信息与服务器本地存储的身份标识信息是否匹配;
    根据匹配结果确定是否转发所述状态修改消息至终端。
  22. 根据权利要求21所述的方法,其中,根据匹配结果确定是否转发状态修改消息至终端,包括:
    若所述状态修改消息中携带的所述终端的身份标识信息与所述服务器本地存储的身份标识信息均不匹配,则忽略所述状态处理消息;
    若所述状态修改消息中携带的所述终端的身份标识信息与所述服务器本地存储的身份标识信息匹配,则转发所述状态修改消息至所述终端。
  23. 根据权利要求20至22任一项所述的方法,其中,对所述终端的状态信息进行修改之后,还包括:
    返回对所述终端的状态信息的修改的执行情况至所述发送方。
  24. 根据权利要求23所述的方法,其中,所述返回对所述终端的状态信息的修改的执行情况至所述发送方,还包括:
    发送执行修改所述终端的状态信息操作的任务身份标识码ID至所述发送方;
    接收所述发送方发送的查询请求,查询所述修改操作的执行情况,其中,所述查询请求中携带有所述任务ID;
    返回对所述终端的状态信息的修改的执行情况至所述发送方。
  25. 根据权利要求20至24任一项所述的方法,其中,按如下步骤对所述状态修改消息进行验证,包括:
    利用所述终端判断所述状态修改消息中携带的所述终端的身份标识信息与所述终端中存储的身份标识信息是否匹配;
    若匹配,则所述状态修改消息合法;
    若不匹配,则所述状态修改消息不合法。
  26. 根据权利要求25所述的方法,其中,对所述状态修改消息进行验证之后,还包括:
    若所述状态修改消息不合法,则忽略所述状态修改消息;
    若所述状态修改消息合法,则获取所述终端的硬件身份标识码ID,并发送携带有所述硬件ID的所述状态修改请求至所述服务器。
  27. 根据权利要求26所述的方法,其中,若所述状态修改消息合法,按如下步骤计算所述硬件ID:
    获取所述终端的国际移动设备身份码IMEI,记为第一字符串;
    获取所述终端的网卡地址,将去除所述网卡地址中的非字母以及非数字字符的字符串记为第二字符串;
    获取所述终端的中央处理器CPU的串号,记为第三字符串;
    按预定顺序合并所述第一字符串、所述第二字符串以及所述第三字符串,并转换合并后的字符串至大写格式,记为第一结果;
    将所述第一结果进行消息摘要算法MD5运算得到第二结果;
    转换所述第二结果至大写格式,得到所述硬件ID。
  28. 根据权利要求20至27任一项所述的方法,其中,所述终端验证所述状态修改消息通过时返回状态修改请求之后,还包括:
    判断所述状态修改请求中携带的所述硬件ID与所述服务器中存储的硬件ID是否匹配;
    若所述硬件ID与所述服务器中存储的硬件ID均不匹配,则忽略所述状态修改请求;
    若所述硬件ID与所述服务器中存储的硬件ID匹配,则触发所述服务器对所述终端的状态信息进行修改的操作。
  29. 根据权利要求20至28任一项所述的方法,其中,所述发送方设置于移动终端,并以短信息或者网络形式发送所述状态修改消息;或者
    所述发送方设置于终端,并以网络形式发送所述状态修改消息。
  30. 一种服务器,包括:
    接收器,配置为接收来自发送方的状态修改消息,其中,所述状态修改消息中携带有状态发生改变的终端的身份标识信息;
    发送器,配置为将所述状态修改消息转发至所述终端的身份标识信息对应的终端,由所述终端对其进行验证;
    状态修改器,配置为根据所述终端验证所述状态修改消息通过时返回的状态修改请求,对所述终端的状态信息进行修改。
  31. 根据权利要求30所述的服务器,其中,还包括:
    判断器,配置为所述接收器接收来自发送方的状态修改消息之后,判断所述状态修改消息中携带的所述终端的身份标识信息与服务器本地存储的身份标识信息是否匹配。
  32. 根据权利要求31所述的服务器,其中,所述发送器还配置为:
    若根据所述判断器确定所述状态修改消息中携带的所述终端的身份标识信息与所述服务器本地存储的身份标识信息均未能匹配,忽略所述状态处理消息;
    若根据所述判断器确定所述状态修改消息中携带的所述终端的身份标识信息与所述服务器本地存储的身份标识信息匹配,转发所述状态修改消息至所述终端。
  33. 根据权利要求30至32任一项所述的服务器,其中,所述发送器还配置为:
    对所述状态修改器对所述终端的状态信息进行修改之后,返回对所述终端的状态信息的修改的执行情况至所述发送方。
  34. 根据权利要求33所述的服务器,其中,还包括:
    所述发送器还配置为:发送执行修改所述终端的状态信息操作的任务身份标识码ID至所述发送方;
    所述接收器还配置为,所述发送器发送所述任务ID至所述发送方之后,接收所述发送方发送的查询请求,查询所述修改操作的执行情况,其中,所述查询请求中携带有所述任务ID;以及
    所述发送器还配置为,返回对所述终端的状态信息的修改的执行情况至所述发送方。
  35. 根据权利要求30至34任一项所述的服务器,其中,所述接收器还配置为:
    接收所述终端发送的携带有所述终端的硬件身份标识码ID的状态修改请求。
  36. 根据权利要求35所述的服务器,其中,所述判断器还配置为:
    判断所述状态修改请求中携带的所述终端的硬件ID与所述服务器本地存储的硬件ID信息是否匹配。
  37. 根据权利要求36所述的服务器,其中,所述状态修改器还配置为:
    若根据所述判断器确定所述硬件ID与所述服务器本地存储的硬件ID信息均不匹配,则忽略所述状态修改请求;
    若根据所述判断器确定所述硬件ID与所述服务器本地存储的硬件ID信息匹配,则对所述终端的状态进行修改。
  38. 一种被盗终端的处理客户端,包括:
    消息接收器,配置为接收服务器转发的、来自发送方的状态修改消息;
    验证器,配置为对接收到的状态修改消息进行验证;
    请求发送器,配置为所述状态修改消息通过验证之后,返回状态修改请求至所述服务器,由所述服务器根据所述状态修改请求对终端的状态进行修改。
  39. 根据权利要求38所述的客户端,其中,所述验证器还配置为:
    判断所述状态修改消息中携带的所述终端的身份标识信息与所述终端中存储的身份标识信息是否匹配,并得到匹配结果。
  40. 根据权利要求39所述的客户端,其中,所述请求发送器还配置为:
    若根据所述验证器确定所述匹配结果为不匹配,则忽略所述状态修改消息;
    若根据所述验证器确定所述匹配结果为匹配,则获取所述终端的硬件身份标识码ID,并发送携带有所述硬件ID的状态修改请求至所述服务器。
  41. 根据权利要求40所述的客户端,其中,还包括:
    计算器,配置为按如下步骤计算所述硬件ID:
    获取所述终端的国际移动设备身份码IMEI,记为第一字符串;
    获取所述终端的网卡地址,将去除所述网卡地址中的非字母以及非数字字符的字符串记为第二字符串;
    获取所述终端的中央处理器CPU的串号,记为第三字符串;
    按预定顺序合并所述第一字符串、所述第二字符串以及所述第三字符串,并转换合并后的字符串至大写格式,记为第一结果;
    将所述第一结果进行消息摘要算法MD5运算得到第二结果;
    转换所述第二结果至大写格式,得到所述终端的硬件ID。
  42. 一种被盗终端的处理方法,包括:
    接收来自发送方的状态修改消息,其中,所述状态修改消息中携带有终端的身份标识信息以及所述终端的当前状态;
    利用服务器对所述状态修改消息进行合法性验证;
    根据通过合法性验证的所述状态修改消息修改所述身份标识信息对应的终端的状态信息至所述当前状态。
  43. 根据权利要求42所述的方法,其中,修改所述身份标识信息对应的终端的状态信息至所述当前状态之后,还包括:
    返回对所述终端的状态信息进行修改的修改结果至所述发送方。
  44. 根据权利要求42或43所述的方法,其中,利用服务器对所述状态修改消息进行合法性验证,包括:
    利用所述服务器根据所述状态修改消息中携带的身份标识信息与所述服务器本地存储的身份标识信息是否匹配,验证所述状态修改消息是否合法;
    若所述状态修改消息中携带的身份标识信息与所述服务器本地存储的身份标识信息均不匹配,则所述状态修改消息不合法;
    若所述状态修改消息中携带的身份标识信息与所述服务器本地存储的身份标识信息匹配,则所述状态修改消息合法。
  45. 根据权利要求44所述的方法,其中,对所述状态修改消息进行合法性验证之后,还包括:
    若所述状态修改消息不合法,则忽略所述状态修改消息;
    若所述状态修改消息合法,则触发所述状态信息修改操作。
  46. 根据权利要求42至45任一项所述的方法,其中,所述终端的身份标识信息至少包括下列任意之一:
    所述终端的国际移动设备身份码IMEI;
    所述终端的用户身份标识码ID;
    所述终端的硬件身份标识码ID。
  47. 根据权利要求42至46任一项所述的方法,其中,所述发送方设置于移动终端,并以短信息或网络形式发送所述状态修改消息;或者
    所述发送方设置于终端,并以网络形式发送所述状态修改消息。
  48. 一种服务器,包括:
    接收器,配置为接收来自发送方的状态修改消息,其中,所述状态修改消息中携带有终端的身份标识信息以及所述终端的当前状态;
    判断器,配置为判断所述状态修改消息是否通过合法性验证;
    状态修改器,配置为根据通过合法性验证的所述状态修改消息修改所述身份标识信息对应的终端的状态信息至所述当前状态。
  49. 根据权利要求48所述的服务器,其中,还包括:
    发送器,配置为返回对所述终端的状态信息进行修改的修改结果至所述发送方。
  50. 根据权利要求48或49所述的服务器,其中,所述判断器还配置为:
    根据所述状态修改消息中携带的身份标识信息与所述服务器本地存储的身份标识信息是否匹配,判断所述状态修改消息是否通过合法性验证;
    若所述状态修改消息中携带的身份标识信息与服务器本地存储的身份标识信息均不匹配,则所述判断器判断所述状态修改消息不合法;
    若所述状态修改消息中携带的身份标识信息与所述服务器本地存储的身份标识信息匹配,则所述判断器判断所述状态修改消息合法。
  51. 根据权利要求50所述的服务器,其中,所述状态修改器还配置为:
    若所述判断器判断所述状态修改消息不合法,则忽略所述状态修改消息;
    若所述判断器判断所述状态修改消息合法,则根据所述状态修改消息修改所述终端的状态信息。
  52. 一种计算机程序,包括计算机可读代码,当所述计算机可读代码在计算设备上运行时,导致所述计算设备执行根据权利要求1-8中的任一个所述的第一种被盗终端的处理方法,和/或,权利要求20-29中的任一个所述的第二种被盗终端的处理方法,和/或,权利要求42-47中的任一个所述的第三种被盗终端的处理方法。
  53. 一种计算机可读介质,其中存储了如权利要求52所述的计算机程序。
PCT/CN2014/093637 2013-12-13 2014-12-11 被盗终端的处理方法及设备 WO2015085941A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US15/103,396 US10078765B2 (en) 2013-12-13 2014-12-11 Method and device for processing stolen terminal

Applications Claiming Priority (6)

Application Number Priority Date Filing Date Title
CN201310687600.5A CN103699821B (zh) 2013-12-13 2013-12-13 被盗终端的处理方法及服务器
CN201310685287.1A CN103702315B (zh) 2013-12-13 2013-12-13 被盗终端的处理方法及设备
CN201310687600.5 2013-12-13
CN201310685113.5A CN103702314B (zh) 2013-12-13 2013-12-13 被盗终端的处理方法及设备
CN201310685113.5 2013-12-13
CN201310685287.1 2013-12-13

Publications (1)

Publication Number Publication Date
WO2015085941A1 true WO2015085941A1 (zh) 2015-06-18

Family

ID=53370636

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2014/093637 WO2015085941A1 (zh) 2013-12-13 2014-12-11 被盗终端的处理方法及设备

Country Status (2)

Country Link
US (1) US10078765B2 (zh)
WO (1) WO2015085941A1 (zh)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102780989A (zh) * 2012-07-06 2012-11-14 北京小米科技有限责任公司 一种移动终端防丢失的方法及***
CN102833712A (zh) * 2012-08-31 2012-12-19 北京小米科技有限责任公司 防止信息泄露的方法、装置、服务器、***和设备
CN102843405A (zh) * 2011-06-24 2012-12-26 基信康信息技术(上海)有限公司 移动终端、网络服务器和移动终端防盗服务的方法
CN103699821A (zh) * 2013-12-13 2014-04-02 北京奇虎科技有限公司 被盗终端的处理方法及服务器
CN103702314A (zh) * 2013-12-13 2014-04-02 北京奇虎科技有限公司 被盗终端的处理方法及设备
CN103702315A (zh) * 2013-12-13 2014-04-02 北京奇虎科技有限公司 被盗终端的处理方法及设备

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2818474B1 (fr) * 2000-12-18 2003-02-21 Richard Toffolet Procede de lutte contre le vol de dispositifs "nomades", dispositif et installation correspondante
KR100605990B1 (ko) 2003-11-03 2006-07-26 삼성전자주식회사 상태정보를 일괄적으로 제공할 수 있는 휴대용 단말기 및시스템
CN100452908C (zh) 2005-11-16 2009-01-14 乔超 一种防止有通信条件/功能的软硬件被盗用的***和方法
US20090183266A1 (en) * 2008-01-11 2009-07-16 Lek Han Tan Method and a system for recovering a lost or stolen electronic device
WO2010097691A1 (en) * 2009-02-27 2010-09-02 Nokia Corporation Method and apparatus for providing device recovery assistance
CN102547502B (zh) * 2010-12-17 2014-12-24 索尼爱立信移动通讯有限公司 一种耳机、耳机使用控制方法及终端
EP2615807B1 (en) 2012-01-12 2015-05-20 Alcatel Lucent Method to protect a mobile against robbery
CN103347131B (zh) 2013-07-05 2015-10-28 张�林 一种智能手机防盗方法及***

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102843405A (zh) * 2011-06-24 2012-12-26 基信康信息技术(上海)有限公司 移动终端、网络服务器和移动终端防盗服务的方法
CN102780989A (zh) * 2012-07-06 2012-11-14 北京小米科技有限责任公司 一种移动终端防丢失的方法及***
CN102833712A (zh) * 2012-08-31 2012-12-19 北京小米科技有限责任公司 防止信息泄露的方法、装置、服务器、***和设备
CN103699821A (zh) * 2013-12-13 2014-04-02 北京奇虎科技有限公司 被盗终端的处理方法及服务器
CN103702314A (zh) * 2013-12-13 2014-04-02 北京奇虎科技有限公司 被盗终端的处理方法及设备
CN103702315A (zh) * 2013-12-13 2014-04-02 北京奇虎科技有限公司 被盗终端的处理方法及设备

Also Published As

Publication number Publication date
US10078765B2 (en) 2018-09-18
US20160314323A1 (en) 2016-10-27

Similar Documents

Publication Publication Date Title
US10355865B1 (en) Systems and techniques for certification of trusted media data
US10958436B2 (en) Methods contract generator and validation server for access control of contract data in a distributed system with distributed consensus
US10135818B2 (en) User biological feature authentication method and system
WO2016034063A1 (zh) 基于伪基站的恶意短信息处理方法及客户端
US10142331B2 (en) Authentication for application
US10019530B2 (en) ID tag authentication system and method
US20160321745A1 (en) Account binding processing method, apparatus and system
WO2015085871A1 (zh) 移动终端防盗方法及客户端
JP6514721B2 (ja) デュアルチャネル識別認証
WO2015067102A1 (zh) 移动设备防盗处理方法及设备
US20090183266A1 (en) Method and a system for recovering a lost or stolen electronic device
CN108460605A (zh) 一种基于区块链的纸质艺术品的溯源防伪方法及***
US20140115340A1 (en) Unique device identifier provision method and apparatus
JP6880055B2 (ja) メッセージ偽造防止実施方法及びデバイス
CN110351239A (zh) 一种基于区块链的电子合同存储方法及装置、电子设备
US10839362B2 (en) Offline pin authentication method and system for IC card
WO2014111022A1 (zh) 一种移动终端用户信息的显示方法、移动终端和服务***
CN110032846B (zh) 身份数据的防误用方法及装置、电子设备
EP4011031B1 (en) Secure identity card using unclonable functions
WO2015085942A1 (zh) 终端状态查询方法、终端防盗方法及相应的设备
WO2015085941A1 (zh) 被盗终端的处理方法及设备
WO2015188728A1 (zh) 移动支付安全的保护方法、装置及云服务器
WO2017197689A1 (zh) 一种sim卡处理方法、装置、终端及esam芯片
WO2016202045A1 (zh) 名片交换方法、设备及***
CN112015494A (zh) 第三方api工具调用方法、***及装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14870314

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 15103396

Country of ref document: US

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 14870314

Country of ref document: EP

Kind code of ref document: A1