WO2015131705A1 - 一种防盗方法、防盗装置及计算机存储介质 - Google Patents

一种防盗方法、防盗装置及计算机存储介质 Download PDF

Info

Publication number
WO2015131705A1
WO2015131705A1 PCT/CN2015/071474 CN2015071474W WO2015131705A1 WO 2015131705 A1 WO2015131705 A1 WO 2015131705A1 CN 2015071474 W CN2015071474 W CN 2015071474W WO 2015131705 A1 WO2015131705 A1 WO 2015131705A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
sim card
identity information
authorization code
cloud server
Prior art date
Application number
PCT/CN2015/071474
Other languages
English (en)
French (fr)
Inventor
席浩
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2015131705A1 publication Critical patent/WO2015131705A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/20Transfer of user or subscriber data
    • H04W8/205Transfer to or from user equipment or user record carrier
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security

Definitions

  • the present invention relates to the security field of mobile terminals, and in particular, to an anti-theft method, an anti-theft device, and a computer storage medium.
  • the role of smartphones in personal life is becoming more and more important. According to Nielsen's latest market research report, most people spend more time on smartphones than computers every month.
  • the user's mobile phone stores a large amount of personal information, such as contacts, text messages, photos, videos, email accounts, and even bank accounts.
  • the voice of mobile phone information security has become stronger and stronger. California has begun to issue a decree to force the addition of smartphones.
  • the Kill-Switch device can realize the possibility of remotely destroying mobile phones.
  • Major mobile phone manufacturers are also exploring solutions for mobile phone theft and self-destruction.
  • the existing anti-theft technology is generally based on a pure software mechanism. Once the software is cracked or incorporated, it poses a certain hidden danger to the security of the smartphone.
  • This paper proposes a method for creating a file for each mobile phone's Subscriber Identity Module (SIM) through the cloud server. Through this method, the user can know the usage of the mobile phone after being stolen, and can also issue instructions to locate, format or destroy the mobile phone.
  • SIM Subscriber Identity Module
  • the embodiment of the present invention is to provide an anti-theft method, an anti-theft device, and a computer storage medium, which can enable the user to query the terminal device and the SIM card related information through the cloud server to know the use situation after the terminal is stolen.
  • the embodiment of the present invention adopts the following technical solutions:
  • an anti-theft method is provided, which is applied to a first terminal, and the method includes:
  • identity information of the first terminal uploading identity information of the SIM card, and identity information of the first terminal to a cloud server, so that the cloud server synchronously saves identity information of the SIM card and the The identity information of a terminal is established, and the SIM card usage file of the first terminal and the terminal usage file of the SIM card are established.
  • the method further includes:
  • the identity information has a one-to-one correspondence.
  • the method further includes:
  • the authorization code is displayed.
  • the method further includes:
  • the method further includes:
  • the method further includes:
  • the method further includes:
  • the control instruction includes erasing data of the first terminal, destroying the first terminal, and positioning the The first terminal.
  • the method further includes:
  • the method further includes:
  • an anti-theft method for applying to a cloud server, the method comprising:
  • Synchronizing the identity information of the SIM card and the identity information of the first terminal establishing a SIM card usage file and a SIM card of the first terminal based on the identity information of the SIM card and the identity information of the first terminal
  • the terminal uses the file.
  • the method further comprises:
  • control instruction includes erasing data of the first terminal, and destroying the Describe the first terminal and locate the first terminal.
  • the method further include:
  • the method further includes:
  • the method further includes:
  • Obtaining a record request sent by the third terminal for querying the SIM card used by the first terminal, and sending the record request for querying the SIM card used by the first terminal includes the identity information of the SIM card currently used by the third terminal Corresponding authorization code and identity information of the first terminal that needs to be queried;
  • the method further include:
  • the control The instructions include erasing data of the first terminal, destroying the first terminal, and locating the first terminal.
  • an anti-theft device which is applied to the first terminal, and includes:
  • a detecting module configured to detect a state of the SIM card insertion interface of the first terminal
  • a reading module configured to read the identity information of the SIM card when the detecting module detects that the SIM card insertion interface has a SIM card insertion;
  • the first determining module is configured to determine whether the identity information of the SIM card is not pre-stored in the first terminal;
  • a first storage module configured to save identity information of the SIM card when the first determining module determines that the identity information of the SIM card is not pre-stored in the first terminal;
  • a transmission module configured to acquire identity information of the first terminal, upload identity information of the SIM card saved by the first storage module, and identity information of the first terminal to a cloud server, to enable the cloud server Synchronizing the identity information of the SIM card and the identity information of the first terminal, and establishing a SIM card usage file of the first terminal and a terminal usage file of the SIM card.
  • the anti-theft device further includes:
  • An authorization code creation module configured to save the identity card of the SIM card by the first storage module After the information is created, an authorization code corresponding to the identity information of the SIM card is created, and the authorization code is uploaded to the cloud server, so that the cloud server saves the authorization code, and the authorization code is The identity information of the SIM card has a one-to-one correspondence.
  • the anti-theft device further includes:
  • a display module configured to: after the authorization code creation module uploads the authorization code to the cloud server, display the authorization code.
  • the anti-theft device further includes:
  • the first query module is configured to send a request for querying the SIM card to use the terminal record to the cloud server, where the sent request for querying the SIM card using the terminal includes the identity information of the SIM card and the phase The corresponding authorization code.
  • the anti-theft device further includes:
  • the second query module is configured to send, to the cloud server, a request for querying the SIM card usage file record of the first terminal; wherein the sent request for querying the SIM card usage record of the first terminal includes an email address
  • the email address is an email address bound to the first terminal.
  • the anti-theft device further includes:
  • a third query module configured to send, to the cloud server, a request for querying a SIM card record used by the second terminal; where the sent request for querying the SIM card used by the second terminal includes the current use of the first terminal.
  • the anti-theft device further includes:
  • a receiving module configured to receive a control instruction sent by the cloud server, and perform a control operation on the first terminal according to the control instruction; the control instruction includes erasing data of the first terminal, and destroying the first Terminal and positioning the first terminal.
  • the anti-theft device further includes:
  • a synchronization status module configured to record a synchronization status flag bit as 0 after determining that the identity information of the SIM card is not pre-stored in the first terminal, and configured to set identity information of the SIM card and the After the identity information of a terminal is uploaded to the cloud server, it is determined that the synchronization status flag is recorded when the cloud server receives the feedback information of the identity information of the SIM card and the identity information of the first terminal. Is 1.
  • the first storage module is located in an area of the first terminal where it is difficult to change information.
  • an anti-theft device for use in a cloud server, including:
  • a first acquiring module configured to acquire identity information of the SIM card sent by the first terminal and identity information of the first terminal;
  • the second storage module is configured to synchronously save the identity information of the SIM card and the identity information of the first terminal, and establish the first terminal based on the identity information of the SIM card and the identity information of the first terminal.
  • the SIM card uses the file and the terminal file of the SIM card.
  • the anti-theft device further comprises:
  • a first instruction output module configured to acquire an instruction sent by the second terminal to operate the first terminal, and send a control instruction to the first terminal according to the instruction;
  • the control instruction includes erasing the Data of the first terminal, destroying the first terminal, and locating the first terminal.
  • the anti-theft device further includes:
  • a third storage module configured to: after the second storage module establishes the SIM card usage file of the first terminal and the terminal usage file of the SIM card, based on the identity information of the SIM card and the identity information of the first terminal, Obtaining an authorization code sent by the first terminal, and saving the authorization code in a SIM card usage file of the first terminal.
  • the anti-theft device further includes:
  • a second obtaining module configured to: after the third storage module saves the authorization code in the SIM card usage file of the first terminal, acquiring, by the first terminal, the query that is recorded by the SIM card using the terminal The request, the sent request to query the SIM card using the terminal record includes the identity information of the SIM card and a corresponding authorization code;
  • a second instruction output module configured to search for a terminal usage file of the SIM card according to the request for querying the SIM card using the terminal, and send a list of the identity information of the SIM card use terminal to the first terminal .
  • the anti-theft device further includes:
  • a third obtaining module configured to: after the third storage module saves the authorization code in the SIM card usage file of the first terminal, acquire, by the third terminal, a query for the SIM card used by the first terminal And sending, by the query, the SIM card record request used by the first terminal includes the identity information of the SIM card currently used by the third terminal, the corresponding authorization code, and the identity information of the first terminal that needs to be queried;
  • the third instruction output module searches for the SIM card usage file of the first terminal according to the query request of the SIM card used by the first terminal, and sends the used file to the third terminal. A list of the identity information of the SIM card.
  • the anti-theft device further includes:
  • the second determining module is configured to compare the first terminal by using the SIM card usage file of the first terminal and the terminal usage file of the SIM card based on the identity information of the SIM card and the identity information of the first terminal.
  • the length of use of the SIM card used is determined to be greater than the preset time length, the corresponding SIM card is set as the super user, and the super user has the right to send a control command to the first terminal;
  • the control command includes erasing data of the first terminal, destroying the first terminal, and locating the first terminal.
  • a computer storage medium storing computer executable instructions for use in a computer storage medium.
  • the anti-theft method applied to the first terminal according to the embodiment of the present invention is performed.
  • a computer storage medium storing computer executable instructions for performing the application to the cloud according to an embodiment of the present invention.
  • the anti-theft method of the server is provided.
  • the beneficial effects of the embodiment of the present invention are: in this embodiment, the identity information of the SIM card used by the terminal device and the terminal device is synchronously saved to the cloud server, and after the terminal device is lost or stolen, the user can query the lost through the cloud server. Or the use of the stolen terminal device, and can send control commands to the lost or stolen terminal device through the cloud server, remotely clear important information in the terminal device or destroy the terminal device or locate the terminal device, thereby preventing important in the terminal device.
  • Information disclosure also provides further possibilities for retrieving terminal devices.
  • Embodiment 1 is a flow chart showing an antitheft method according to Embodiment 1 of the present invention.
  • FIG. 2 is a schematic diagram showing a query result of a cloud server displayed by a first terminal in an embodiment of the present invention
  • FIG. 3 is a schematic flow chart showing an antitheft method according to Embodiment 2 of the present invention.
  • FIG. 4 is a schematic diagram showing an interaction process of a user querying terminal information through a cloud server in an embodiment of the present invention
  • Figure 5 is a block diagram showing an antitheft device applied to a first terminal side in an embodiment of the present invention
  • Fig. 6 is a block diagram showing an antitheft device applied to the cloud server side in the embodiment of the present invention.
  • the anti-theft method applied to the first terminal in the embodiment of the present invention first detects the state of the user identity identification SIM card insertion interface of the first terminal, and reads the current use SIM when detecting that the SIM card insertion interface has a SIM card insertion.
  • the identity information of the card is determined according to the read information, and whether the identity information of the currently used SIM card is not saved in advance. If the determination result is yes, the identity information of the current SIM card is saved, and the identity of the first terminal is acquired.
  • FIG. 1 is a schematic flow chart of an antitheft method according to Embodiment 1 of the present invention; as shown in FIG. 1, the method includes:
  • Step S101 The state of the SIM card insertion interface of the first terminal is detected.
  • step S102 is performed.
  • Step S102 When it is detected that the SIM card insertion interface has a SIM card inserted, the identity information of the SIM card is read.
  • the SIM card insertion interface detects the insertion of the SIM card
  • the identity information of the inserted SIM card is read, and the identity information of the SIM card may specifically be the card number of the SIM card, and step S103 is performed.
  • Step S103 When it is determined that the identity information of the SIM card is not pre-stored in the first terminal, the identity information of the SIM card is saved.
  • the identity information of the SIM card read in step S102 it is determined whether the identity information of the SIM card is the SIM card identity information that is not pre-saved. If the determination result is yes, that is, the identity information of the SIM card is not The pre-stored SIM card identity information is used to save the identity information of the SIM card.
  • Step S104 Obtain identity information of the first terminal, upload identity information of the SIM card, and identity information of the first terminal to a cloud server, so that the cloud server synchronously saves identity information of the SIM card and And identifying the identity information of the first terminal, and establishing a SIM card usage file of the first terminal and a terminal usage file of the SIM card.
  • the cloud server enables the cloud server to synchronously save the identity information of the current SIM card and the identity information of the first terminal, and establish a SIM card usage file of the first terminal and a terminal usage file of the SIM card. Users can query the file information stored in the cloud server when needed.
  • IMEI mobile device international identity
  • the method further includes:
  • Step S1031 Create an authorization code corresponding to the identity information of the SIM card, and upload the authorization code to the cloud server, so that the cloud server saves the authorization code, and has a one-to-one correspondence between the authorization code and the identity information of the SIM card.
  • the method further includes: displaying the authorization code.
  • the authorization code is generated by the first terminal by using the identity information of the SIM card according to a preset algorithm, and each SIM card number corresponds to a unique authorization code; after the authorization code is saved in the cloud server, the A terminal may display an authorization code to prompt the user to record. If the user wants to query the identity information of the first terminal and the SIM card stored in the cloud server, the identity information of the SIM card and the corresponding information need to be provided at the same time.
  • Authorization code where the user can query by texting or logging in to the cloud server through the network. If the user forgets the authorization code, the SIM card can be inserted into the terminal device with the anti-theft mechanism to view the authorization code information.
  • the authorization code is uploaded to the cloud server to enable the cloud service After the authorization code is saved, the method further includes:
  • the sent request for querying the SIM card using the terminal includes the identity information of the SIM card and a corresponding authorization code;
  • the identity information of the current SIM card and the corresponding authorization code are provided at the same time.
  • the method further includes:
  • the method further includes:
  • the sent request for querying the SIM card used by the second terminal includes the identity information of the SIM card currently used by the first terminal Corresponding authorization code and identity information of the second terminal that needs to be queried.
  • the user may query the information of the other terminal device through the terminal device having the anti-theft mechanism, but provide the cloud server with the identity information and the corresponding authorization of the SIM card currently used in the terminal device performing the query operation. The code and the identity information of the terminal device being queried.
  • the method further includes:
  • Step S105 Receive a control instruction sent by the cloud server, and perform a control operation on the first terminal according to the control instruction.
  • the control instruction includes erasing data of the first terminal, destroying the first terminal, and a location location.
  • the first terminal is described. In this embodiment, after the first terminal is stolen or lost, the important information stored in the first terminal may be prevented from leaking, and the first terminal that is stolen or lost may also be conveniently found.
  • the identity information of the SIM card is saved, and the synchronization status flag is recorded as 0, that is, the first terminal is indicated.
  • the information needs to be synchronized with the cloud server, and the synchronized information content includes the identity information of the first terminal and the identity information of the SIM card, and uploads the identity information of the SIM card and the identity information of the first terminal to the cloud server.
  • the cloud server completes the synchronization when it is determined that the cloud server completes the synchronous storage of the identity information of the SIM card and the feedback information of the identity information of the first terminal. Thereafter, the synchronization status flag is recorded as 1.
  • the embodiment of the present invention further provides a computer storage medium, where the computer storage medium stores computer executable instructions, and the computer executable instructions are used to execute the antitheft method applied to the first terminal according to the embodiment of the present invention. .
  • the technical solution provided by the embodiment of the present invention is to synchronously store the identity information of the SIM card used in the same terminal on the cloud server, so that the user can judge the time and usage of the lost or stolen terminal according to the queried information. It is important to complete the synchronization between the terminal and the cloud server.
  • the terminal After the terminal is lost or stolen, it is directly used for card replacement, and the terminal will send the identity information of the currently used SIM card to the cloud server to complete synchronization;
  • the terminal is restored to the factory settings or brushed. If the identity information of the currently used SIM card has been saved in the terminal before being restored to the factory settings or brushed, but the synchronization with the cloud server is not completed, the factory is restored. Even if the SIM card is not inserted in the plug-in interface of the terminal, the terminal synchronizes with the cloud server; if the identity information of the SIM card currently used before the factory reset is saved in the terminal, the SIM card is inserted into the card of the terminal again. After the interface is synchronized with the cloud server;
  • SIM card number used by the network can be synchronized to the cloud server, and the user can query the currently used SIM card number. .
  • FIG. 2 is a schematic diagram showing the result of the cloud server query displayed by the first terminal in the embodiment of the present invention.
  • the SIM card of the user may exist in two or more files due to the SIM card. Used in different terminal devices with this anti-theft mechanism.
  • the cloud server will return the SIMEI associated IMEI code for the last 3 months, and indicate the usage time. The user can determine the lost or stolen terminal according to the specific usage time. And check the current status of the lost or stolen terminal.
  • the embodiment of the invention further provides an anti-theft method, and the anti-theft method is applied to a cloud server.
  • 3 is a schematic flow chart of an antitheft method according to Embodiment 2 of the present invention; as shown in FIG. 3, the method includes:
  • Step S201 Acquire identity information of the SIM card sent by the first terminal and identity information of the first terminal.
  • Step S202 Synchronize the identity information of the SIM card and the identity information of the first terminal, and establish a SIM card usage file of the first terminal based on the identity information of the SIM card and the identity information of the first terminal. And the terminal of the SIM card uses the file.
  • the cloud server After the synchronization saves the identity information of the SIM card and the identity information of the first terminal, the cloud server establishes a SIM card usage file of the first terminal and a terminal usage file of the SIM card, and the user may Need to query the usage files of the terminal device and SIM card.
  • the synchronization saves identity information of the SIM card and identity information of the first terminal, and establishes the first information based on identity information of the SIM card and identity information of the first terminal.
  • the method further includes:
  • Step S203 Acquire an authorization code sent by the first terminal, and save the authorization code in a SIM card usage file of the first terminal.
  • the method further includes:
  • Step S204 Acquire an instruction for operating the first terminal by the second terminal, and send a control instruction to the first terminal according to the instruction; the control instruction includes erasing data of the first terminal. Destroying the first terminal and locating the first terminal.
  • a super user is set on the cloud server, and only the super user has the right to send a control command to the first terminal.
  • the setting rule of the super user is: comparing the length of use of all the SIM cards used by the first terminal, determining that the SIM card having the longest usage time is the super user, and enabling the super user to have the right authority
  • the first terminal sends a control command, the control command includes erasing data of the first terminal, destroying the first terminal, and locating the first terminal.
  • the method further includes:
  • CXSJ is an abbreviation for querying mobile phones.
  • This example is a way to query information, or you can log in to the cloud website for similar methods.
  • the method further includes:
  • Obtaining a record request sent by the third terminal for querying the SIM card used by the first terminal, and sending the record request for querying the SIM card used by the first terminal includes the identity information of the SIM card currently used by the third terminal Corresponding authorization code and identity information of the first terminal that needs to be queried;
  • IMEI1's user profile is:
  • the first terminal After receiving the short message command, the first terminal will automatically return to the current location;
  • the first terminal After receiving the short message instruction, the first terminal automatically erases the data in the storage space;
  • CXWZ is an abbreviation for the query location
  • CCSJ is an abbreviation for erasing data.
  • This example is a way to query information, or you can log in to the cloud website for similar methods.
  • the embodiment of the invention further provides a computer storage medium, wherein the computer storage medium stores computer executable instructions, and the computer executable instructions are used to execute the anti-theft method applied to the cloud server according to the embodiment of the invention.
  • FIG. 4 is a schematic diagram showing an interaction process of a user querying terminal information through a cloud server in an embodiment of the present invention.
  • the first terminal may send a query to the cloud server to query the SIM card usage file record of the first terminal or use the current SIM card.
  • the cloud server determines whether the request information sent by the first terminal is correct, and if yes, sends the SIM card usage record of the first terminal or the current SIM to the first terminal.
  • the card uses the information recorded by the terminal file.
  • the process in which the second terminal sends a request for querying the SIM card usage file record of the first terminal to the cloud server or the first terminal sends a request for querying the SIM card usage file record of the second terminal to the cloud server is the same as the process described above. same.
  • FIG. 5 is a block diagram of an anti-theft device applied to the first terminal side in the embodiment of the present invention; as shown in FIG. 5, the anti-theft device includes:
  • the detecting module 301 is configured to detect a state of the SIM card insertion interface of the first terminal;
  • the reading module 302 is configured to read the identity information of the SIM card when the detecting module 301 detects that the SIM card insertion interface has a SIM card insertion;
  • the first determining module 303 is configured to determine whether the first terminal does not save the foregoing Identity information of the SIM card;
  • the first storage module 304 is configured to save the identity information of the SIM card when the first determining module 303 determines that the identity information of the SIM card is not pre-stored in the first terminal;
  • the transmitting module 306 is configured to acquire the identity information of the first terminal, and upload the identity information of the SIM card saved by the first storage module 304 and the identity information of the first terminal to a cloud server, so that the The cloud server synchronously saves the identity information of the SIM card and the identity information of the first terminal, and establishes a SIM card usage file of the first terminal and a terminal usage file of the SIM card.
  • the anti-theft device further includes: an authorization code creation module 305, configured to: after the first storage module 304 saves the identity information of the SIM card, create an identity information corresponding to the SIM card. And the authorization code is uploaded to the cloud server, so that the cloud server saves the authorization code, and has a one-to-one correspondence between the authorization code and the identity information of the SIM card.
  • an authorization code creation module 305 configured to: after the first storage module 304 saves the identity information of the SIM card, create an identity information corresponding to the SIM card. And the authorization code is uploaded to the cloud server, so that the cloud server saves the authorization code, and has a one-to-one correspondence between the authorization code and the identity information of the SIM card.
  • the anti-theft device further includes: a display module configured to display the authorization code.
  • the anti-theft device further includes: a first query module configured to send a request to the cloud server to query the SIM card usage terminal record; wherein the sent query uses the SIM card use terminal
  • the recorded request includes the identity information of the SIM card and a corresponding authorization code.
  • the anti-theft device further includes: a second query module, configured to send, to the cloud server, a request for querying a SIM card usage file record of the first terminal; wherein the sent query is The request for using the file record by the SIM card of the first terminal includes an email address, and the email address is an email address bound to the first terminal.
  • a second query module configured to send, to the cloud server, a request for querying a SIM card usage file record of the first terminal; wherein the sent query is The request for using the file record by the SIM card of the first terminal includes an email address, and the email address is an email address bound to the first terminal.
  • the anti-theft device further includes: a third query module configured to send, to the cloud server, a request for querying a SIM card record used by the second terminal; wherein, the sent The request for querying the SIM card used by the second terminal includes the identity information of the SIM card currently used by the first terminal, the corresponding authorization code, and the identity information of the second terminal that needs to be queried.
  • a third query module configured to send, to the cloud server, a request for querying a SIM card record used by the second terminal; wherein, the sent The request for querying the SIM card used by the second terminal includes the identity information of the SIM card currently used by the first terminal, the corresponding authorization code, and the identity information of the second terminal that needs to be queried.
  • the anti-theft device further includes: a receiving module configured to receive a control instruction sent by the cloud server, and perform a control operation on the first terminal according to the control instruction; Deleting the first terminal and locating the first terminal in addition to the data of the first terminal.
  • the anti-theft device further includes: a synchronization status module configured to: after determining that the identity information of the SIM card is not pre-saved in the first terminal, record the synchronization status flag as 0; After uploading the identity information of the SIM card and the identity information of the first terminal to the cloud server, determining that the cloud server receives the identity information of the SIM card and the identity information of the first terminal are synchronously saved. The synchronization status flag is recorded as 1 when the feedback information is received.
  • a synchronization status module configured to: after determining that the identity information of the SIM card is not pre-saved in the first terminal, record the synchronization status flag as 0; After uploading the identity information of the SIM card and the identity information of the first terminal to the cloud server, determining that the cloud server receives the identity information of the SIM card and the identity information of the first terminal are synchronously saved. The synchronization status flag is recorded as 1 when the feedback information is received.
  • the first storage module is located in an area in the first terminal where it is difficult to change information; specifically, the first storage module is located in a read only memory (ROM) in the first terminal.
  • ROM read only memory
  • Boot Area Partition or PRMB Area Partition in the zone In addition to the Boot Area Partition or PRMB Area Partition in the ROM area, it can also be a ROM space of other devices, such as a separate encrypted ROM, an audio processor, a ROM, a SENSOR ROM, which is characterized in that the content stored therein is restored by the factory. Settings or flashing cannot be changed.
  • processing units in the anti-theft device of the embodiments of the present invention can be understood by referring to the related description of the anti-theft method.
  • the processing units in the anti-theft device according to the embodiments of the present invention can be implemented by implementing the present invention.
  • the function of the analog circuit described in the example is implemented, and can also be implemented by running the software of the function described in the embodiment of the present invention on the smart terminal.
  • the detecting module 301, the reading module 302, the first determining module 303, and the authorization code creating module 305 in the anti-theft device may be centrally located in the device in practical applications.
  • the first storage module 304 in the anti-theft device is actually In an application, it may be implemented by a memory in the device; in a practical application, the transmission module 306 in the anti-theft device may be implemented by a transceiver or a transceiver antenna in the device.
  • the embodiment of the invention also provides an anti-theft device.
  • 6 is a block diagram showing an antitheft device applied to a cloud server side in an embodiment of the present invention; as shown in FIG. 6, the antitheft device includes:
  • the first obtaining module 401 is configured to acquire identity information of the SIM card sent by the first terminal and identity information of the first terminal;
  • the second storage module 402 is configured to synchronously save the identity information of the SIM card and the identity information of the first terminal, and establish the first terminal based on the identity information of the SIM card and the identity information of the first terminal.
  • the SIM card uses the file and the SIM card for the terminal to use the file.
  • the anti-theft device further includes: a third storage module 403, configured to: the second storage module 402 establishes the first information based on identity information of the SIM card and identity information of the first terminal After the SIM card of the terminal uses the file and the terminal of the SIM card to use the file, the authorization code sent by the first terminal is obtained, and the authorization code is saved in the SIM card usage file of the first terminal.
  • a third storage module 403 configured to: the second storage module 402 establishes the first information based on identity information of the SIM card and identity information of the first terminal After the SIM card of the terminal uses the file and the terminal of the SIM card to use the file, the authorization code sent by the first terminal is obtained, and the authorization code is saved in the SIM card usage file of the first terminal.
  • the anti-theft device further includes: a first instruction output module 404 configured to acquire an instruction sent by the second terminal to operate the first terminal, according to the instruction, to the A terminal sends a control command; the control command includes erasing data of the first terminal, destroying the first terminal, and locating the first terminal.
  • the anti-theft device further includes: a second acquiring module, configured to: after the third storage module 403 saves the authorization code in the SIM card usage file of the first terminal, acquire the The request sent by the first terminal to query the SIM card using the terminal, The sent request for querying the SIM card using the terminal includes the identity information of the SIM card and a corresponding authorization code;
  • a second instruction output module configured to search for a terminal usage file of the SIM card according to the request for querying the SIM card using the terminal, and send a list of the identity information of the SIM card use terminal to the first terminal .
  • the anti-theft device further includes: a third obtaining module, configured to: the third storage module 403 saves the authorization code after the SIM card usage file of the first terminal, and acquires a third Querying, by the terminal, the SIM card record request used by the first terminal, and sending the query that the SIM card record request used by the first terminal includes the identity information of the SIM card currently used by the third terminal, and the corresponding authorization The code and the identity information of the first terminal that needs to be queried;
  • a third instruction output module configured to search for a SIM card usage file of the first terminal according to the query request for querying the SIM card used by the first terminal, and send the first terminal to the third terminal A list of identity information that has been used with the SIM card.
  • the anti-theft device further includes: a second determining module, configured to establish a SIM card usage file of the first terminal based on identity information of the SIM card and identity information of the first terminal After the terminal of the SIM card uses the file, compare the length of use of the SIM card used by the first terminal, and determine that the used time length is greater than the preset time length, set the corresponding SIM card as the super user, and make the The super user has the right to send a control instruction to the first terminal; the control instruction includes erasing data of the first terminal, destroying the first terminal, and locating the first terminal.
  • a second determining module configured to establish a SIM card usage file of the first terminal based on identity information of the SIM card and identity information of the first terminal After the terminal of the SIM card uses the file, compare the length of use of the SIM card used by the first terminal, and determine that the used time length is greater than the preset time length, set the corresponding SIM card as the super user, and make the The super user has the right to send a control instruction to the first terminal
  • processing units in the anti-theft device of the embodiments of the present invention can be understood by referring to the related description of the anti-theft method.
  • the processing units in the anti-theft device according to the embodiments of the present invention can be implemented by implementing the present invention.
  • the function of the analog circuit described in the example is implemented, and the software running the function described in the embodiment of the present invention can also be implemented on the smart terminal. Now.
  • the second storage module 402 and the third storage module 403 in the anti-theft device may be implemented by a memory in the device in an actual application; the first acquisition module 401 in the anti-theft device and The first instruction output module 404 can be implemented by a transceiver or a transceiver antenna in the device in practical applications.
  • embodiments of the present invention can be provided as a method, system, or computer program product. Accordingly, the present invention can take the form of a hardware embodiment, a software embodiment, or a combination of software and hardware. Moreover, the invention can take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage and optical storage, etc.) including computer usable program code.
  • the computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device.
  • the apparatus implements the functions specified in one or more blocks of a flow or a flow and/or block diagram of the flowchart.
  • These computer program instructions can also be loaded onto a computer or other programmable data processing device such that a series of operational steps are performed on a computer or other programmable device to produce computer-implemented processing for execution on a computer or other programmable device. Instructions are provided for implementation The steps of a function specified in a block or blocks of a flow or a flow and/or a block diagram of a flow chart.
  • the embodiment of the present invention saves the identity information of the SIM card used by the terminal device and the terminal device to the cloud server, and after the terminal device is lost or stolen, the user can query the use of the lost or stolen terminal device through the cloud server.
  • the cloud server can send control commands to the lost or stolen terminal device, remotely clear important information in the terminal device or destroy the terminal device or locate the terminal device, prevent important information leakage in the terminal device, and also retrieve the terminal.
  • the device offers further possibilities.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Databases & Information Systems (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

本发明实施例公开了一种防盗方法、防盗装置及计算机存储介质,所述方法包括:检测第一终端的SIM卡***接口的状态;当检测到所述SIM卡***接口有SIM卡***时,读取所述SIM卡的身份信息;确定所述第一终端中未预先保存所述SIM卡的身份信息时,保存所述SIM卡的身份信息;获取第一终端的身份信息,将所述SIM卡的身份信息和所述第一终端的身份信息上传至云服务器,使所述云服务器同步保存所述SIM卡的身份信息和第一终端的身份信息,并建立所述第一终端的SIM卡使用档案和SIM卡的终端使用档案。

Description

一种防盗方法、防盗装置及计算机存储介质 技术领域
本发明涉及移动终端的安全领域,尤其涉及一种防盗方法、防盗装置及计算机存储介质。
背景技术
智能手机在个人生活中扮演的角色越来越重要,根据尼尔森(Nielsen)公司最新的市场研究报告,现在大多人每月花在智能手机上的时间要比电脑多。用户的手机中都存储着大量个人信息,比如通讯录、短信、照片、视频、邮箱账号甚至银行账号,手机信息安全的呼声随之愈加强烈,美国加州已着手颁布法令,强行在智能手机中加入自我毁灭装置(Kill-Switch),实现远程销毁手机的可能,各大手机厂商也在摸索手机防盗及自销毁的方案。但现有的防盗技术一般是基于纯软件的机制,软件一旦被破解或者被并入侵入,对智能手机的安全性造成一定隐患。
如果有一种防盗方案,加入硬件机制,借助云服务平台,可以使移动终端防盗机制更加完善本文提出一种通过云服务器给每个手机的客户识别模块(SIM,Subscriber Identity Module)卡建立档案的方法,通过此方法,用户可以知道手机被盗后的使用情况,也可以发指令定位、格式化或销毁手机。
发明内容
本发明实施例期望提供一种防盗方法、防盗装置及计算机存储介质,可以使用户通过云服务器查询终端设备和SIM卡的相关信息,了解终端被盗后的使用的情况。
为了解决上述技术问题,本发明实施例采用如下技术方案:
依据本发明实施例的一个方面,提供了一种防盗方法,应用于第一终端,所述方法包括:
检测第一终端的SIM卡***接口的状态;
当检测到所述SIM卡***接口有SIM卡***时,读取所述SIM卡的身份信息;
确定所述第一终端中未预先保存所述SIM卡的身份信息时,保存所述SIM卡的身份信息;
获取所述第一终端的身份信息,将所述SIM卡的身份信息和所述第一终端的身份信息上传至云服务器,使所述云服务器同步保存所述SIM卡的身份信息和所述第一终端的身份信息,并建立所述第一终端的SIM卡使用档案和SIM卡的终端使用档案。
在另一实施例中,所述保存所述SIM卡的身份信息之后,所述方法还包括:
创建与所述SIM卡的身份信息相对应的授权码,并将所述授权码上传至所述云服务器,使所述云服务器保存所述授权码,并使所述授权码与所述SIM卡的身份信息具有一一对应关系。
在另一实施例中,将所述授权码上传至所述云服务器之后,所述方法还包括:
显示所述授权码。
在另一实施例中,将所述授权码上传至所述云服务器,使所述云服务器保存所述授权码之后,所述方法还包括:
向所述云服务器发送查询所述SIM卡使用终端记录的请求;其中,所发送的查询所述SIM卡使用终端记录的请求中包括所述SIM卡的身份信息及相对应的授权码。
在另一实施例中,将所述授权码上传至所述云服务器,使所述云服务器保存所述授权码之后,所述方法还包括:
向所述云服务器发送查询所述第一终端的SIM卡使用档案记录的请求;其中,所发送的查询所述第一终端的SIM卡使用档案记录的请求包括邮箱地址,所述邮箱地址为所述第一终端所绑定的邮箱地址。
在另一实施例中,将所述授权码上传至所述云服务器,使所述云服务器保存所述授权码之后,所述方法还包括:
向所述云服务器发送查询第二终端所使用SIM卡记录的请求;其中,所发送的查询第二终端所使用SIM卡记录的请求中包括第一终端当前所使用的所述SIM卡的身份信息、相对应的授权码及所需要查询的第二终端的身份信息。
在另一实施例中,所述方法还包括:
接收所述云服务器发送的控制指令,根据所述控制指令对所述第一终端进行控制操作;所述控制指令包括擦除所述第一终端的数据、销毁所述第一终端和定位所述第一终端。
在另一实施例中,所述确定所述第一终端中未预先保存所述SIM卡的身份信息之后,所述方法还包括:
将同步状态标志位记录为0;
相应的,所述将所述SIM卡的身份信息和所述第一终端的身份信息上传至云服务器之后,所述方法还包括:
确定接收到所述云服务器完成同步保存所述SIM卡的身份信息和所述第一终端的身份信息的反馈信息时,将所述同步状态标志位记录为1。
依据本发明实施例的另一个方面,提供了一种防盗方法,应用于云服务器,所述方法包括:
获取第一终端发送的SIM卡的身份信息和所述第一终端的身份信息;
同步保存所述SIM卡的身份信息和所述第一终端的身份信息,基于所述SIM卡的身份信息和所述第一终端的身份信息建立所述第一终端的SIM卡使用档案和SIM卡的终端使用档案。
在另一实施例中,所述方法还包括:。
获取由第二终端发送的对所述第一终端进行操作的指令,根据所述指令,对所述第一终端发送控制指令;所述控制指令包括擦除所述第一终端的数据、销毁所述第一终端和定位所述第一终端。
在另一实施例中,所述基于所述SIM卡的身份信息和所述第一终端的身份信息建立所述第一终端的SIM卡使用档案和SIM卡的终端使用档案之后,所述方法还包括:
获取所述第一终端发送的授权码,将所述授权码保存在所述第一终端的SIM卡使用档案中。
在另一实施例中,将所述授权码保存在所述第一终端的SIM卡使用档案之后,所述方法还包括:
获取所述第一终端发送的查询所述SIM卡使用终端记录的请求,所发送的查询所述SIM卡使用终端记录的请求中包括所述SIM卡的身份信息及相对应的授权码;
根据所述查询所述SIM卡使用终端记录的请求,查找所述SIM卡的终端使用档案,向所述第一终端发送所述SIM卡使用终端的身份信息的列表。
在另一实施例中,将所述授权码保存在所述第一终端的SIM卡使用档案中之后,所述方法还包括:
获取第三终端发送的查询所述第一终端所使用SIM卡的记录请求,所发送的查询所述第一终端所使用SIM卡的记录请求中包括第三终端当前所使用的SIM卡的身份信息、相对应的授权码及所需要查询的所述第一终端的身份信息;
根据所述查询所述第一终端所使用SIM卡的记录请求,查找所述第一终端的SIM卡使用档案,向所述第三终端发送所述第一终端所使用过SIM卡的身份信息的列表。
在另一实施例中,所述基于所述SIM卡的身份信息和所述第一终端的身份信息建立所述第一终端的SIM卡使用档案和SIM卡的终端使用档案之后,所述方法还包括:
比较所述第一终端曾使用的所有SIM卡的使用时间长度,确定使用时间长度最长的SIM卡为超级用户,使所述超级用户有权限对所述第一终端发送控制指令,所述控制指令包括擦除所述第一终端的数据、销毁所述第一终端和定位所述第一终端。
依据本发明实施例的另一个方面,还提供了一种防盗装置,应用于第一终端,包括:
检测模块,配置为检测第一终端的SIM卡***接口的状态;
读取模块,配置为当所述检测模块检测到所述SIM卡***接口有SIM卡***时,读取所述SIM卡的身份信息;
第一判断模块,配置为判断所述第一终端中是否未预先保存所述SIM卡的身份信息;
第一存储模块,配置为当所述第一判断模块确定所述第一终端中未预先保存所述SIM卡的身份信息时,保存所述SIM卡的身份信息;
传输模块,配置为获取所述第一终端的身份信息,将所述第一存储模块保存的所述SIM卡的身份信息和所述第一终端的身份信息上传至云服务器,使所述云服务器同步保存所述SIM卡的身份信息和所述第一终端的身份信息,并建立所述第一终端的SIM卡使用档案和SIM卡的终端使用档案。
在另一实施例中,所述防盗装置还包括:
授权码创建模块,配置为所述第一存储模块保存所述SIM卡的身份信 息之后,创建与所述SIM卡的身份信息相对应的授权码,并将所述授权码上传至所述云服务器,使所述云服务器保存所述授权码,并使所述授权码与所述SIM卡的身份信息具有一一对应关系。
在另一实施例中,所述防盗装置还包括:
显示模块,配置为所述授权码创建模块将所述授权码上传至所述云服务器之后,显示所述授权码。
在另一实施例中,所述防盗装置还包括:
第一查询模块,配置为向所述云服务器发送查询所述SIM卡使用终端记录的请求;其中,所发送的查询所述SIM卡使用终端记录的请求中包括所述SIM卡的身份信息及相对应的授权码。
在另一实施例中,所述防盗装置还包括:
第二查询模块,配置为向所述云服务器发送查询所述第一终端的SIM卡使用档案记录的请求;其中,所发送的查询所述第一终端的SIM卡使用档案记录的请求包括邮箱地址,所述邮箱地址为所述第一终端所绑定的邮箱地址。
在另一实施例中,所述防盗装置还包括:
第三查询模块,配置为向所述云服务器发送查询第二终端所使用SIM卡记录的请求;其中,所发送的查询第二终端所使用SIM卡记录的请求中包括第一终端当前所使用的所述SIM卡的身份信息、相对应的授权码及所需要查询的第二终端的身份信息。
在另一实施例中,所述防盗装置还包括:
接收模块,配置为接收所述云服务器发送的控制指令,根据所述控制指令对所述第一终端进行控制操作;所述控制指令包括擦除所述第一终端的数据、销毁所述第一终端和定位所述第一终端。
在另一实施例中,所述防盗装置还包括:
同步状态模块,配置为在确定所述第一终端中未预先保存所述SIM卡的身份信息之后,将同步状态标志位记录为0;还配置为将所述SIM卡的身份信息和所述第一终端的身份信息上传至云服务器之后,确定接收到所述云服务器完成同步保存所述SIM卡的身份信息和所述第一终端的身份信息的反馈信息时,将所述同步状态标志位记录为1。
在另一实施例中,所述第一存储模块位于所述第一终端中难以更改其中信息的区域。
依据本发明实施例的另一个方面,提供了一种防盗装置,应用于云服务器,包括:
第一获取模块,配置为获取第一终端发送的SIM卡的身份信息和所述第一终端的身份信息;
第二存储模块,配置为同步保存所述SIM卡的身份信息和所述第一终端的身份信息,基于所述SIM卡的身份信息和所述第一终端的身份信息建立所述第一终端的SIM卡使用档案和SIM卡的终端使用档案。
在另一实施例中,所述防盗装置还包括:。
第一指令输出模块,配置为获取由第二终端发送的对所述第一终端进行操作的指令,根据所述指令,对所述第一终端发送控制指令;所述控制指令包括擦除所述第一终端的数据、销毁所述第一终端和定位所述第一终端。
在另一实施例中,所述防盗装置还包括:
第三存储模块,配置为所述第二存储模块基于所述SIM卡的身份信息和所述第一终端的身份信息建立所述第一终端的SIM卡使用档案和SIM卡的终端使用档案之后,获取所述第一终端发送的授权码,将所述授权码保存在所述第一终端的SIM卡使用档案中。
在另一实施例中,所述防盗装置还包括:
第二获取模块,配置为所述第三存储模块将所述授权码保存在所述第一终端的SIM卡使用档案中之后,获取所述第一终端发送的查询所述SIM卡使用终端记录的请求,所发送的查询所述SIM卡使用终端记录的请求中包括所述SIM卡的身份信息及相对应的授权码;
第二指令输出模块,配置为根据所述查询所述SIM卡使用终端记录的请求,查找所述SIM卡的终端使用档案,向所述第一终端发送所述SIM卡使用终端的身份信息的列表。
在另一实施例中,所述防盗装置还包括:
第三获取模块,配置为所述第三存储模块将所述授权码保存在所述第一终端的SIM卡使用档案之后,获取第三终端发送的查询所述第一终端所使用SIM卡记录请求,所发送的查询所述第一终端所使用SIM卡记录请求中包括第三终端当前所使用的SIM卡的身份信息、相对应的授权码及所需要查询的第一终端的身份信息;
第三指令输出模块,根据所述查询所述第一终端所使用SIM卡的记录请求,查找所述第一终端的SIM卡使用档案,向所述第三终端发送所述第一终端所使用过SIM卡的身份信息的列表。
在另一实施例中,所述防盗装置还包括:
第二判断模块,配置为基于所述SIM卡的身份信息和所述第一终端的身份信息建立所述第一终端的SIM卡使用档案和SIM卡的终端使用档案之后,比较所述第一终端曾使用的SIM卡的使用时间长度,确定使用时间长度大于预设时间长度时,设定相对应的SIM卡为超级用户,并使所述超级用户有权限对所述第一终端发送控制指令;所述控制指令包括擦除所述第一终端的数据、销毁所述第一终端和定位所述第一终端。
依据本发明实施例的另一个方面,提供了一种计算机存储介质,所述计算机存储介质中存储有计算机可执行指令,所述计算机可执行指令用于 执行本发明实施例所述的应用于第一终端的防盗方法。
依据本发明实施例的另一个方面,提供了一种计算机存储介质,所述计算机存储介质中存储有计算机可执行指令,所述计算机可执行指令用于执行本发明实施例所述的应用于云服务器的防盗方法。
本发明实施例的有益效果是:本实施例是将终端设备和终端设备使用过的SIM卡的身份信息同步保存到云服务器中,在终端设备丢失或被盗后,用户可以通过云服务器查询丢失或被盗的终端设备的使用情况,并可以通过云服务器向丢失或被盗的终端设备发送控制指令,远程清除终端设备中的重要信息或销毁终端设备或定位终端设备,防止终端设备中的重要信息泄露,也为找回终端设备提供了进一步的可能性。
附图说明
图1表示本发明的实施例一的防盗方法的流程示意图;
图2表示本发明的实施例中第一终端显示的云服务器查询结果示意图;
图3表示本发明的实施例二的防盗方法的流程示意图;
图4表示本发明的实施例中用户通过云服务器查询终端信息的交互过程示意图;
图5表示本发明的实施例中应用于第一终端侧的防盗装置的框图;
图6表示本发明的实施例中应用于云服务器侧的防盗装置的框图。
具体实施方式
下面将参照附图更详细地描述本发明的示例性实施例。虽然附图中显示了本发明的示例性实施例,然而应当理解,可以以各种形式实现本发明而不应被这里阐述的实施例所限制。相反,提供这些实施例是为了能够更透彻地理解本发明,并且能够将本发明的范围完整的传达给本领域的技术人员。
实施例一
本发明实施例中应用于第一终端的防盗方法,首先检测所述第一终端的用户身份识别SIM卡***接口的状态,当检测到SIM卡***接口有SIM卡***时,读取当前使用SIM卡的身份信息,根据读取到信息,判断是否未预先保存当前使用SIM卡的身份信息,若判断结果为是时,则保存当前使用SIM卡的身份信息,同时获取所述第一终端的身份信息,并将当前使用SIM卡的身份信息和所述第一终端的身份信息上传至云服务器,使所述云服务器同步保存当前使用SIM卡的身份信息和所述第一终端的身份信息,并建立所述第一终端的SIM卡使用档案和SIM卡的终端使用档案。
图1表示本发明的实施例一的防盗方法的流程示意图;如图1所示,所述方法包括:
步骤S101、检测第一终端的SIM卡***接口的状态。
这里,随时监控所述第一终端的SIM卡***接口的状态,当检测到有SIM卡***所述SIM卡***接口时,执行步骤S102。
步骤S102、当检测到所述SIM卡***接口有SIM卡***时,读取所述SIM卡的身份信息。
这里,当SIM卡***接口检测到有SIM卡***时,读取***的SIM卡的身份信息,所述SIM卡的身份信息具体可以是所述SIM卡的***,执行步骤S103。
步骤S103、确定所述第一终端中未预先保存所述SIM卡的身份信息时,保存所述SIM卡的身份信息。
这里,根据步骤S102读取到的SIM卡的身份信息,判断所述SIM卡的身份信息是否为未预先保存的SIM卡身份信息,若判断结果为是,即所述SIM卡的身份信息为未预先保存的SIM卡身份信息,保存所述SIM卡的身份信息。
步骤S104、获取所述第一终端的身份信息,将所述SIM卡的身份信息和所述第一终端的身份信息上传至云服务器,使所述云服务器同步保存所述SIM卡的身份信息和所述第一终端的身份信息,并建立所述第一终端的SIM卡使用档案和SIM卡的终端使用档案。
这里,在保存当前使用SIM卡的身份信息的同时,获取第一终端的身份信息,即移动设备国际身份(IMEI)码,并将当前使用SIM卡的身份信息和第一终端的身份信息上传至云服务器,使云服务器同步保存当前使用SIM卡的身份信息和第一终端的身份信息,并建立第一终端的SIM卡使用档案和SIM卡的终端使用档案。用户在需要时,可以查询保存在云服务器中的档案信息。
本实施例中,在步骤S103之后,即保存完当前使用SIM卡的身份信息之后,所述方法还包括:
步骤S1031、创建与所述SIM卡的身份信息相对应的授权码,并将授权码上传至云服务器,使云服务器保存授权码,并使授权码与SIM卡的身份信息具有一一对应关系。
其中,将所述授权码上传至所述云服务器之后,所述方法还包括:显示所述授权码。
这里,所述授权码由所述第一终端通过SIM卡的身份信息按预设算法产生,每个SIM***对应唯一授权码;在将所述授权码保存在所述云服务器之后,所述第一终端会显示授权码,提示用户进行记录,用户若要查询保存在云服务器中的所述第一终端和所述SIM卡的身份信息,需要同时提供所述SIM卡的身份信息和相对应的授权码,其中,用户查询的方式可以为发短信或者通过网络登陆云服务器。若用户忘记授权码,可将SIM卡***具有此防盗机制的终端设备中,查看授权码信息。
在另一实施例中,将所述授权码上传至所述云服务器,使所述云服务 器保存所述授权码之后,所述方法还包括:
向所述云服务器发送查询所述SIM卡使用终端记录的请求;其中,所发送的查询所述SIM卡使用终端记录的请求中包括所述SIM卡的身份信息及相对应的授权码;本实施例中只有同时提供了当前使用SIM卡的身份信息及相对应的授权码,才能进行查询。
在另一实施例中,将所述授权码上传至所述云服务器,使所述云服务器保存所述授权码之后,所述方法还包括:
向所述云服务器发送查询所述第一终端的SIM卡使用档案记录的请求,所发送的查询所述第一终端的SIM卡使用档案记录的请求为邮箱地址,所述邮箱地址为所述第一终端所绑定的邮箱地址。
在另一实施例中,将所述授权码上传至所述云服务器,使所述云服务器保存所述授权码之后,所述方法还包括:
向所述云服务器发送查询第二终端所使用SIM卡记录的请求;其中,所发送的查询第二终端所使用SIM卡记录的请求中包括第一终端当前所使用的所述SIM卡的身份信息、相对应的授权码及所需要查询的第二终端的身份信息。本实施例中,用户可以通过具有此防盗机制的终端设备查询另一终端设备的信息,但需要向云服务器提供执行查询操作的终端设备中当前所使用的SIM卡的身份信息、相对应的授权码及被查询的终端设备的身份信息。
在另一实施例中,所述方法还包括:
步骤S105、接收云服务器发送的控制指令,根据控制指令对所述第一终端进行控制操作;其中,所述控制指令包括擦除所述第一终端的数据、销毁所述第一终端和定位所述第一终端。本实施例可以在所述第一终端被盗或丢失后,防止保存在所述第一终端的重要信息发生泄漏,同时还可以便于找到被盗或丢失的第一终端。
具体的,所述确定所述第一终端中未预先保存所述SIM卡的身份信息之后,则保存所述SIM卡的身份信息的同时,将同步状态标志位记录为0,即表明第一终端需要与云服务器进行信息同步,同步的信息内容包括第一终端的身份信息和所述SIM卡的身份信息,在将所述SIM卡的身份信息和所述第一终端的身份信息上传至云服务器之后,检测是否接收到云服务器同步完成的反馈信息,确定接收到所述云服务器完成同步保存所述SIM卡的身份信息和所述第一终端的身份信息的反馈信息时,即云服务器完成同步之后,将所述同步状态标志位记录为1。
本发明实施例还提供了一种计算机存储介质,所述计算机存储介质中存储有计算机可执行指令,所述计算机可执行指令用于执行本发明实施例所述的应用于第一终端的防盗方法。
由于本发明实施例提供的技术方案是将在同一终端中使用过的SIM卡的身份信息同步保存在云服务器,方便用户根据查询到的信息,判断终端丢失或被盗的时间及使用情况,所以能否完成终端与云服务器的同步至关重要。
由于终端丢失或被盗后会出现很多使用情况,下面简单描述三种情况下,终端与云服务器的同步状况:
1、终端丢失或被盗后,直接被换卡使用,终端会发送当前使用的SIM卡的身份信息到云服务器完成同步;
2、终端被恢复出厂设置或进行刷机处理,若在被恢复出厂设置或进行刷机处理之前,当前使用的SIM卡的身份信息已保存在终端中,但未完成与云服务器同步,则恢复出厂后,即使SIM卡没有插在终端的***接口中,终端会与云服务器同步;若恢复出厂之前当前使用的SIM卡的身份信息为保存在终端中,则在再次将SIM卡***在终端的插卡接口后与云服务器同步;
3、在终端丢失或被盗后可能有多个SIM卡***在丢失或被盗的终端中,根据设置,联网使用过的SIM***一定能同步到云服务器,用户可以查询到当前使用的SIM***。
另外,图2表示本发明的实施例中第一终端显示的云服务器查询结果示意图;如图2所示,有用户的SIM卡可能在2个或多个档案中都存在,原因是这个SIM卡在不同的具备此防盗机制的终端设备中使用过,这种情况下,云服务器会返回SIM卡最近3个月关联IMEI码,并标注使用时间,用户可根据具体使用时间确定丢失或被盗终端,并查丢失或被盗终端的当前状态。
实施例二
本发明实施例还提供了一种防盗方法,所述防盗方法应用于云服务器中。图3表示本发明的实施例二的防盗方法的流程示意图;如图3所示,所述方法包括:
步骤S201、获取第一终端发送的SIM卡的身份信息和所述第一终端的身份信息。
步骤S202、同步保存所述SIM卡的身份信息和所述第一终端的身份信息,基于所述SIM卡的身份信息和所述第一终端的身份信息建立所述第一终端的SIM卡使用档案和SIM卡的终端使用档案。
这里,所述同步保存所述SIM卡的身份信息和所述第一终端的身份信息之后,所述云服务器建立所述第一终端的SIM卡使用档案和SIM卡的终端使用档案,用户可以根据需要,查询终端设备和SIM卡的使用档案。
在另一实施例中,所述同步保存所述SIM卡的身份信息和所述第一终端的身份信息,基于所述SIM卡的身份信息和所述第一终端的身份信息建立所述第一终端的SIM卡使用档案和SIM卡的终端使用档案之后,所述方法还包括:
步骤S203、获取所述第一终端发送的授权码,将所述授权码保存在所述第一终端的SIM卡使用档案中。
在另一实施例中,所述方法还包括:
步骤S204、获取由第二终端发送的对所述第一终端进行操作的指令,根据所述指令,对所述第一终端发送控制指令;所述控制指令包括擦除所述第一终端的数据、销毁所述第一终端和定位所述第一终端。
其中,为了防止任何用户都可以由第二终端通过云服务器对所述第一终端发送控制指令,在云服务器端会设定一个超级用户,只有超级用户才有权限对第一终端发送控制指令,其中所述超级用户的设定规则为:比较所述第一终端曾使用的所有SIM卡的使用时间长度,确定使用时间长度最长的SIM卡为超级用户,使所述超级用户有权限对所述第一终端发送控制指令,所述控制指令包括擦除所述第一终端的数据、销毁所述第一终端和定位所述第一终端。
在另一实施例中,将所述授权码保存在所述第一终端的SIM卡使用档案之后,所述方法还包括:
获取所述第一终端发送的查询所述SIM卡使用终端记录的请求,所发送的查询所述SIM卡使用终端记录的请求中包括所述SIM卡的身份信息及相对应的授权码;
根据所述查询所述SIM卡使用终端记录的请求,查找所述SIM卡的终端使用档案,向所述第一终端发送所述SIM卡使用终端的身份信息的列表。
例如:用户:发送短信(CXSJ 138********授权码)给云服务器(专用号码400****),
云服务器返回:
您好,138********近期使用过的手机有:
IMEI1,**年**月**日;
IMEI2,**年**月**日;
IMEI3,**年**月**日。
其中,CXSJ为查询手机的缩写。
此示例为查询信息的一种方法,也可以登陆云网站查询,方法类似。
在另一实施例中,将所述授权码保存在所述第一终端的SIM卡使用档案之后,所述方法还包括:
获取第三终端发送的查询所述第一终端所使用SIM卡的记录请求,所发送的查询所述第一终端所使用SIM卡的记录请求中包括第三终端当前所使用的SIM卡的身份信息、相对应的授权码及所需要查询的所述第一终端的身份信息;
根据所述查询所述第一终端所使用SIM卡的记录请求,查找所述第一终端的SIM卡使用档案,向所述第三终端发送所述第一终端所使用过SIM卡的身份信息的列表。
例如:用户:发送短信(CXSJ 139********授权码第一终端授权码)给云服务器(专用号码400****),
云服务器返回:
您好,IMEI1的用户档案为:
SIM1,**年**月**日;
SIM2,**年**月**日;
SIM3,**年**月**日;
如果当前使用SIM号为超级用户,此时可以发短信给SIM3,例如;
CXWZ IMEI1;
第一终端收到短信指令后,会自动返回当前所在位置;
CCSJ IMEI2;
第一终端收到短信指令后,会自动擦除存储空间内的数据;
其中:
CXWZ为查询位置的缩写;
CCSJ为擦除数据的缩写。
此示例为查询信息的一种方法,也可以登陆云网站查询,方法类似。
本发明实施例还提供了一种计算机存储介质,所述计算机存储介质中存储有计算机可执行指令,所述计算机可执行指令用于执行本发明实施例所述的应用于云服务器的防盗方法。
实施例三
结合实施例一和实施例二的描述,在本实施例中,将描述用户通过云服务器查询终端信息的交互过程。
图4表示本发明的实施例中用户通过云服务器查询终端信息的交互过程示意图;如图4所示,第一终端可以向云服务器发送查询第一终端的SIM卡使用档案记录或当前SIM卡使用终端档案记录的请求,云服务器接收请求信息后,判断所述第一终端所发送的请求信息是否正确,若正确,则向所述第一终端发送第一终端的SIM卡使用档案记录或当前SIM卡使用终端档案记录的信息。同理,第二终端向所述云服务器发送查询第一终端的SIM卡使用档案记录的请求或第一终端向云服务器发送查询第二终端的SIM卡使用档案记录的请求的过程同上描述的过程一样。
实施例四
本发明实施例还提供了一种防盗装置;图5表示本发明的实施例中应用于第一终端侧的防盗装置的框图;如图5所示,所述防盗装置包括:
检测模块301,配置为检测第一终端的SIM卡***接口的状态;
读取模块302,配置为当所述检测模块301检测到所述SIM卡***接口有SIM卡***时,读取所述SIM卡的身份信息;
第一判断模块303,配置为判断所述第一终端中是否未预先保存所述 SIM卡的身份信息;
第一存储模块304,配置为当所述第一判断模块303确定所述第一终端中未预先保存所述SIM卡的身份信息时,保存所述SIM卡的身份信息;
传输模块306,配置为获取所述第一终端的身份信息,将所述第一存储模块304保存的所述SIM卡的身份信息和所述第一终端的身份信息上传至云服务器,使所述云服务器同步保存所述SIM卡的身份信息和所述第一终端的身份信息,并建立所述第一终端的SIM卡使用档案和SIM卡的终端使用档案。
在另一实施例中,所述防盗装置还包括:授权码创建模块305,配置为所述第一存储模块304保存所述SIM卡的身份信息之后,创建与所述SIM卡的身份信息相对应的授权码,并将所述授权码上传至所述云服务器,使所述云服务器保存所述授权码,并使所述授权码与所述SIM卡的身份信息具有一一对应关系。
在另一实施例中,所述防盗装置还包括:显示模块,配置为显示所述授权码。
在另一实施例中,所述防盗装置还包括:第一查询模块,配置为向所述云服务器发送查询所述SIM卡使用终端记录的请求;其中,所发送的查询所述SIM卡使用终端记录的请求中包括所述SIM卡的身份信息及相对应的授权码。
在另一实施例中,所述防盗装置还包括:第二查询模块,配置为向所述云服务器发送查询所述第一终端的SIM卡使用档案记录的请求;其中,所发送的查询所述第一终端的SIM卡使用档案记录的请求包括邮箱地址,所述邮箱地址为所述第一终端所绑定的邮箱地址。
在另一实施例中,所述防盗装置还包括:第三查询模块,配置为向所述云服务器发送查询第二终端所使用SIM卡记录的请求;其中,所发送的 查询第二终端所使用SIM卡记录的请求中包括第一终端当前所使用的所述SIM卡的身份信息、相对应的授权码及所需要查询的第二终端的身份信息。
在另一实施例中,所述防盗装置还包括:接收模块,配置为接收所述云服务器发送的控制指令,根据所述控制指令对所述第一终端进行控制操作;所述控制指令包括擦除所述第一终端的数据、销毁所述第一终端和定位所述第一终端。
在另一实施例中,所述防盗装置还包括:同步状态模块,配置为确定所述第一终端中未预先保存所述SIM卡的身份信息之后,将同步状态标志位记录为0;还配置为将所述SIM卡的身份信息和所述第一终端的身份信息上传至云服务器之后,确定接收到所述云服务器完成同步保存所述SIM卡的身份信息和所述第一终端的身份信息的反馈信息时,将所述同步状态标志位记录为1。
在另一实施例中,所述第一存储模块位于所述第一终端中难以更改其中信息的区域;具体的,所述第一存储模块位于所述第一终端中的只读存储器(ROM)区域中的Boot Area Partition或PRMB Area Partition。其中除ROM区域中的Boot Area Partition或PRMB Area Partition,还可以为其他器件ROM空间,如独立的加密ROM、音频处理器的,ROM、SENSOR的ROM,其特点是存储在其中的内容通过恢复出厂设置或刷机无法进行更改。
本领域技术人员应当理解,本发明实施例的防盗装置中各处理单元的功能,可参照前述防盗方法的相关描述而理解,本发明实施例的防盗装置中各处理单元,可通过实现本发明实施例所述的功能的模拟电路而实现,也可以通过执行本发明实施例所述的功能的软件在智能终端上的运行而实现。
本实施例中,所述防盗装置中的检测模块301、读取模块302、第一判断模块303和授权码创建模块305,在实际应用中均可由所述装置中的中央 处理器(CPU,Central Processing Unit)、数字信号处理器(DSP,Digital Signal Processor)或可编程门阵列(FPGA,Field-Programmable Gate Array)实现;所述防盗装置中的第一存储模块304在实际应用中,可由所述装置中的存储器实现;所述防盗装置中的传输模块306在实际应用中,可由所述装置中的收发器或收发天线实现。
实施例五
本发明实施例还提供了一种防盗装置。图6表示本发明的实施例中应用于云服务器侧的防盗装置的框图;如图6所示,所述防盗装置包括:
第一获取模块401,配置为获取第一终端发送的SIM卡的身份信息和所述第一终端的身份信息;
第二存储模块402,配置为同步保存所述SIM卡的身份信息和所述第一终端的身份信息,基于所述SIM卡的身份信息和所述第一终端的身份信息建立所述第一终端的SIM卡使用档案和SIM卡的终端使用档案。
在另一实施例中,所述防盗装置还包括:第三存储模块403,配置为所述第二存储模块402基于所述SIM卡的身份信息和所述第一终端的身份信息建立所述第一终端的SIM卡使用档案和SIM卡的终端使用档案之后,获取所述第一终端发送的授权码,将所述授权码保存在所述第一终端的SIM卡使用档案中。
在另一实施例中,所述防盗装置还包括:第一指令输出模块404,配置为获取由第二终端发送的对所述第一终端进行操作的指令,根据所述指令,对所述第一终端发送控制指令;所述控制指令包括擦除所述第一终端的数据、销毁所述第一终端和定位所述第一终端。
在另一实施例中,所述防盗装置还包括:第二获取模块,配置为所述第三存储模块403将所述授权码保存在所述第一终端的SIM卡使用档案中之后,获取所述第一终端发送的查询所述SIM卡使用终端记录的请求,所 发送的查询所述SIM卡使用终端记录的请求中包括所述SIM卡的身份信息及相对应的授权码;
第二指令输出模块,配置为根据所述查询所述SIM卡使用终端记录的请求,查找所述SIM卡的终端使用档案,向所述第一终端发送所述SIM卡使用终端的身份信息的列表。
在另一实施例中,所述防盗装置还包括:第三获取模块,配置为所述第三存储模块403将所述授权码保存在所述第一终端的SIM卡使用档案之后,获取第三终端发送的查询所述第一终端所使用SIM卡记录请求,所发送的查询所述第一终端所使用SIM卡记录请求中包括第三终端当前所使用的SIM卡的身份信息、相对应的授权码及所需要查询的第一终端的身份信息;
第三指令输出模块,配置为根据所述查询所述第一终端所使用SIM卡的记录请求,查找所述第一终端的SIM卡使用档案,向所述第三终端发送所述第一终端所使用过SIM卡的身份信息的列表。
在另一实施例中,所述防盗装置还包括:第二判断模块,配置为基于所述SIM卡的身份信息和所述第一终端的身份信息建立所述第一终端的SIM卡使用档案和SIM卡的终端使用档案之后,比较所述第一终端曾使用的SIM卡的使用时间长度,确定使用时间长度大于预设时间长度时,设定相对应的SIM卡为超级用户,并使所述超级用户有权限对所述第一终端发送控制指令;所述控制指令包括擦除所述第一终端的数据、销毁所述第一终端和定位所述第一终端。
本领域技术人员应当理解,本发明实施例的防盗装置中各处理单元的功能,可参照前述防盗方法的相关描述而理解,本发明实施例的防盗装置中各处理单元,可通过实现本发明实施例所述的功能的模拟电路而实现,也可以通过执行本发明实施例所述的功能的软件在智能终端上的运行而实 现。
本实施例中,所述防盗装置中的第二存储模块402和第三存储模块403,在实际应用中,均可由所述装置中的存储器实现;所述防盗装置中的第一获取模块401和第一指令输出模块404在实际应用中,均可由所述装置中的收发器或收发天线实现。
本领域内的技术人员应明白,本发明的实施例可提供为方法、***、或计算机程序产品。因此,本发明可采用硬件实施例、软件实施例、或结合软件和硬件方面的实施例的形式。而且,本发明可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器和光学存储器等)上实施的计算机程序产品的形式。
本发明是参照根据本发明实施例的方法、设备(***)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现 在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。
以上所述仅是本发明实施例的实施方式,应当指出,对于本技术领域的普通技术人员来说,在不脱离本发明实施例原理的前提下,还可以作出若干改进和润饰,这些改进和润饰也应视为本发明实施例的保护范围。
工业实用性
本发明实施例通过将终端设备和终端设备使用过的SIM卡的身份信息同步保存到云服务器中,在终端设备丢失或被盗后,用户可以通过云服务器查询丢失或被盗的终端设备的使用情况,并可以通过云服务器向丢失或被盗的终端设备发送控制指令,远程清除终端设备中的重要信息或销毁终端设备或定位终端设备,防止终端设备中的重要信息泄露,也为找回终端设备提供了进一步的可能性。

Claims (31)

  1. 一种防盗方法,应用于第一终端,所述方法包括:
    检测第一终端的客户识别模块SIM卡***接口的状态;
    当检测到所述SIM卡***接口有SIM卡***时,读取所述SIM卡的身份信息;
    确定所述第一终端中未预先保存所述SIM卡的身份信息时,保存所述SIM卡的身份信息;
    获取所述第一终端的身份信息,将所述SIM卡的身份信息和所述第一终端的身份信息上传至云服务器,使所述云服务器同步保存所述SIM卡的身份信息和所述第一终端的身份信息,并建立所述第一终端的SIM卡使用档案和SIM卡的终端使用档案。
  2. 如权利要求1所述防盗方法,其中,所述保存所述SIM卡的身份信息之后,所述方法还包括:
    创建与所述SIM卡的身份信息相对应的授权码,并将所述授权码上传至所述云服务器,使所述云服务器保存所述授权码,并使所述授权码与所述SIM卡的身份信息具有一一对应关系。
  3. 如权利要求2所述防盗方法,其中,将所述授权码上传至所述云服务器之后,所述方法还包括:
    显示所述授权码。
  4. 如权利要求2所述防盗方法,其中,将所述授权码上传至所述云服务器,使所述云服务器保存所述授权码之后,所述方法还包括:
    向所述云服务器发送查询所述SIM卡使用终端记录的请求;其中,所发送的查询所述SIM卡使用终端记录的请求中包括所述SIM卡的身份信息及相对应的授权码。
  5. 如权利要求2所述防盗方法,其中,将所述授权码上传至所述云服 务器,使所述云服务器保存所述授权码之后,所述方法还包括:
    向所述云服务器发送查询所述第一终端的SIM卡使用档案记录的请求;其中,所发送的查询所述第一终端的SIM卡使用档案记录的请求包括邮箱地址,所述邮箱地址为所述第一终端所绑定的邮箱地址。
  6. 如权利要求2所述防盗方法,其中,将所述授权码上传至所述云服务器,使所述云服务器保存所述授权码之后,所述方法还包括:
    向所述云服务器发送查询第二终端所使用SIM卡记录的请求;其中,所发送的查询第二终端所使用SIM卡记录的请求中包括第一终端当前所使用的所述SIM卡的身份信息、相对应的授权码及所需要查询的第二终端的身份信息。
  7. 如权利要求1所述防盗方法,其中,所述方法还包括:
    接收所述云服务器发送的控制指令,根据所述控制指令对所述第一终端进行控制操作;所述控制指令包括擦除所述第一终端的数据、销毁所述第一终端和定位所述第一终端。
  8. 如权利要求1所述防盗方法,其中,所述确定所述第一终端中未预先保存所述SIM卡的身份信息之后,所述方法还包括:
    将同步状态标志位记录为0;
    相应的,所述将所述SIM卡的身份信息和所述第一终端的身份信息上传至云服务器之后,所述方法还包括:
    确定接收到所述云服务器完成同步保存所述SIM卡的身份信息和所述第一终端的身份信息的反馈信息时,将所述同步状态标志位记录为1。
  9. 一种防盗方法,应用于云服务器,所述方法包括:
    获取第一终端发送的SIM卡的身份信息和所述第一终端的身份信息;
    同步保存所述SIM卡的身份信息和所述第一终端的身份信息,基于所述SIM卡的身份信息和所述第一终端的身份信息建立所述第一终端的SIM 卡使用档案和SIM卡的终端使用档案。
  10. 如权利要求9所述防盗方法,其中,所述方法还包括:
    获取由第二终端发送的对所述第一终端进行操作的指令,根据所述指令,对所述第一终端发送控制指令;所述控制指令包括擦除所述第一终端的数据、销毁所述第一终端和定位所述第一终端。
  11. 如权利要求9所述防盗方法,其中,所述基于所述SIM卡的身份信息和所述第一终端的身份信息建立所述第一终端的SIM卡使用档案和SIM卡的终端使用档案之后,所述方法还包括:
    获取所述第一终端发送的授权码,将所述授权码保存在所述第一终端的SIM卡使用档案中。
  12. 如权利要求11所述防盗方法,其中,将所述授权码保存在所述第一终端的SIM卡使用档案之后,所述方法还包括:
    获取所述第一终端发送的查询所述SIM卡使用终端记录的请求,所发送的查询所述SIM卡使用终端记录的请求中包括所述SIM卡的身份信息及相对应的授权码;
    根据所述查询所述SIM卡使用终端记录的请求,查找所述SIM卡的终端使用档案,向所述第一终端发送所述SIM卡使用终端的身份信息的列表。
  13. 如权利要求11所述防盗方法,其中,将所述授权码保存在所述第一终端的SIM卡使用档案之后,所述方法还包括:
    获取第三终端发送的查询所述第一终端所使用SIM卡的记录请求,所发送的查询所述第一终端所使用SIM卡的记录请求中包括第三终端当前所使用的SIM卡的身份信息、相对应的授权码及所需要查询的所述第一终端的身份信息;
    根据所述查询所述第一终端所使用SIM卡的记录请求,查找所述第一终端的SIM卡使用档案,向所述第三终端发送所述第一终端所使用过SIM 卡的身份信息的列表。
  14. 如权利要求9所述防盗方法,其中,所述基于所述SIM卡的身份信息和所述第一终端的身份信息建立所述第一终端的SIM卡使用档案和SIM卡的终端使用档案之后,所述方法还包括:
    比较所述第一终端曾使用的所有SIM卡的使用时间长度,确定使用时间长度最长的SIM卡为超级用户,使所述超级用户有权限对所述第一终端发送控制指令,所述控制指令包括擦除所述第一终端的数据、销毁所述第一终端和定位所述第一终端。
  15. 一种防盗装置,应用于第一终端,所述装置包括:
    检测模块,配置为检测第一终端的客户识别模块SIM卡***接口的状态;
    读取模块,配置为当所述检测模块检测到所述SIM卡***接口有SIM卡***时,读取所述SIM卡的身份信息;
    第一判断模块,配置为判断所述第一终端中是否未预先保存所述SIM卡的身份信息;
    第一存储模块,配置为当所述第一判断模块确定所述第一终端中未预先保存所述SIM卡的身份信息时,保存所述SIM卡的身份信息;
    传输模块,配置为获取所述第一终端的身份信息,将所述第一存储模块保存的所述SIM卡的身份信息和所述第一终端的身份信息上传至云服务器,使所述云服务器同步保存所述SIM卡的身份信息和所述第一终端的身份信息,并建立所述第一终端的SIM卡使用档案和SIM卡的终端使用档案。
  16. 如权利要求15所述的防盗装置,其中,所述防盗装置还包括:
    授权码创建模块,配置为所述第一存储模块保存所述SIM卡的身份信息之后,创建与所述SIM卡的身份信息相对应的授权码,并将所述授权码上传至所述云服务器,使所述云服务器保存所述授权码,并使所述授权码 与所述SIM卡的身份信息具有一一对应关系。
  17. 如权利要求16所述的防盗装置,其中,所述防盗装置还包括:
    显示模块,配置为所述授权码创建模块将所述授权码上传至所述云服务器之后,显示所述授权码。
  18. 如权利要求16所述的防盗装置,其中,所述防盗装置还包括:
    第一查询模块,配置为向所述云服务器发送查询所述SIM卡使用终端记录的请求;其中,所发送的查询所述SIM卡使用终端记录的请求中包括所述SIM卡的身份信息及相对应的授权码。
  19. 如权利要求16所述的防盗装置,其中,所述防盗装置还包括:
    第二查询模块,配置为向所述云服务器发送查询所述第一终端的SIM卡使用档案记录的请求;其中,所发送的查询所述第一终端的SIM卡使用档案记录的请求包括邮箱地址,所述邮箱地址为所述第一终端所绑定的邮箱地址。
  20. 如权利要求16所述防盗装置,其中,所述防盗装置还包括:
    第三查询模块,配置为向所述云服务器发送查询第二终端所使用SIM卡记录的请求;其中,所发送的查询第二终端所使用SIM卡记录的请求中包括第一终端当前所使用的所述SIM卡的身份信息、相对应的授权码及所需要查询的第二终端的身份信息。
  21. 如权利要求15所述的防盗装置,其中,所述防盗装置还包括:
    接收模块,配置为接收所述云服务器发送的控制指令,根据所述控制指令对所述第一终端进行控制操作;所述控制指令包括擦除所述第一终端的数据、销毁所述第一终端和定位所述第一终端。
  22. 如权利要求15所述的防盗装置,其中,所述防盗装置还包括:
    同步状态模块,配置为在确定所述第一终端中未预先保存所述SIM卡的身份信息之后,将同步状态标志位记录为0;还配置为将所述SIM卡的 身份信息和所述第一终端的身份信息上传至云服务器之后,确定接收到所述云服务器完成同步保存所述SIM卡的身份信息和所述第一终端的身份信息的反馈信息时,将所述同步状态标志位记录为1。
  23. 如权利要求15所述的防盗装置,其中,所述第一存储模块位于所述第一终端中难以更改其中信息的区域。
  24. 一种防盗装置,应用于云服务器,所述防盗装置包括:
    第一获取模块,配置为获取第一终端发送的SIM卡的身份信息和所述第一终端的身份信息;
    第二存储模块,配置为同步保存所述SIM卡的身份信息和所述第一终端的身份信息,基于所述SIM卡的身份信息和所述第一终端的身份信息建立所述第一终端的SIM卡使用档案和SIM卡的终端使用档案。
  25. 如权利要求24所述防盗装置,其中,所述防盗装置还包括:。
    第一指令输出模块,配置为获取由第二终端发送的对所述第一终端进行操作的指令,根据所述指令,对所述第一终端发送控制指令;所述控制指令包括擦除所述第一终端的数据、销毁所述第一终端和定位所述第一终端。
  26. 如权利要求24所述防盗装置,其中,所述防盗装置还包括:
    第三存储模块,配置为所述第二存储模块基于所述SIM卡的身份信息和所述第一终端的身份信息建立所述第一终端的SIM卡使用档案和SIM卡的终端使用档案之后,获取所述第一终端发送的授权码,将所述授权码保存在所述第一终端的SIM卡使用档案中。
  27. 如权利要求26所述防盗装置,其中,所述防盗装置还包括:
    第二获取模块,配置为所述第三存储模块将所述授权码保存在所述第一终端的SIM卡使用档案中之后,获取所述第一终端发送的查询所述SIM卡使用终端记录的请求,所发送的查询所述SIM卡使用终端记录的请求中 包括所述SIM卡的身份信息及相对应的授权码;
    第二指令输出模块,配置为根据所述查询所述SIM卡使用终端记录的请求,查找所述SIM卡的终端使用档案,向所述第一终端发送所述SIM卡使用终端的身份信息的列表。
  28. 如权利要求26所述防盗装置,其中,所述防盗装置还包括:
    第三获取模块,配置为所述第三存储模块将所述授权码保存在所述第一终端的SIM卡使用档案之后,获取第三终端发送的查询所述第一终端所使用SIM卡记录请求,所发送的查询所述第一终端所使用SIM卡记录请求中包括第三终端当前所使用的SIM卡的身份信息、相对应的授权码及所需要查询的第一终端的身份信息;
    第三指令输出模块,配置为根据所述查询所述第一终端所使用SIM卡的记录请求,查找所述第一终端的SIM卡使用档案,向所述第三终端发送所述第一终端所使用过SIM卡的身份信息的列表。
  29. 如权利要求24所述防盗装置,其中,所述防盗装置还包括:
    第二判断模块,配置为基于所述SIM卡的身份信息和所述第一终端的身份信息建立所述第一终端的SIM卡使用档案和SIM卡的终端使用档案之后,比较所述第一终端曾使用的SIM卡的使用时间长度,确定使用时间长度大于预设时间长度时,设定相对应的SIM卡为超级用户,并使所述超级用户有权限对所述第一终端发送控制指令;所述控制指令包括擦除所述第一终端的数据、销毁所述第一终端和定位所述第一终端。
  30. 一种计算机存储介质,所述计算机存储介质中存储有计算机可执行指令,所述计算机可执行指令用于执行权利要求1至8任一项所述的防盗方法。
  31. 一种计算机存储介质,所述计算机存储介质中存储有计算机可执行指令,所述计算机可执行指令用于执行权利要求9至14任一项所述的防 盗方法。
PCT/CN2015/071474 2014-10-17 2015-01-23 一种防盗方法、防盗装置及计算机存储介质 WO2015131705A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201410554870.3A CN105578451A (zh) 2014-10-17 2014-10-17 一种防盗方法及防盗装置
CN201410554870.3 2014-10-17

Publications (1)

Publication Number Publication Date
WO2015131705A1 true WO2015131705A1 (zh) 2015-09-11

Family

ID=54054553

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/071474 WO2015131705A1 (zh) 2014-10-17 2015-01-23 一种防盗方法、防盗装置及计算机存储介质

Country Status (2)

Country Link
CN (1) CN105578451A (zh)
WO (1) WO2015131705A1 (zh)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105635488A (zh) * 2016-03-17 2016-06-01 广东欧珀移动通信有限公司 一种移动终端防盗处理的方法及设备
CN105657709A (zh) * 2016-02-24 2016-06-08 惠州Tcl移动通信有限公司 云端化网络化移动终端及其通信方法和云通信***
CN105704697A (zh) * 2016-03-25 2016-06-22 广东欧珀移动通信有限公司 网络侧实现移动设备丢失报警的方法和***
CN113407364A (zh) * 2021-06-25 2021-09-17 青岛海信移动通信技术股份有限公司 应用程序的调用服务方法、装置、电子设备及存储介质
CN113543023A (zh) * 2021-07-29 2021-10-22 展讯半导体(成都)有限公司 一种定位方法及通信装置

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106304033A (zh) * 2016-08-31 2017-01-04 北京握奇数据***有限公司 一种基于机卡绑定的手机信息防御方法及***
CN108134995A (zh) * 2017-04-26 2018-06-08 黄策 机卡分离型网络终端的有效性管理办法
CN107197102A (zh) * 2017-06-29 2017-09-22 北京小米移动软件有限公司 通信请求处理方法、装置及存储介质
CN113190824B (zh) * 2021-04-19 2023-02-21 深圳市安全守护科技有限公司 身份信息的获取方法、装置、终端设备及计算机存储介质

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1395407A (zh) * 2001-07-05 2003-02-05 致福股份有限公司 移动电话防盗窃的设定及其运作方法
US20080081609A1 (en) * 2006-09-29 2008-04-03 Motorola, Inc. Method and system for associating a user profile to a sim card
CN103648089A (zh) * 2013-11-07 2014-03-19 北京奇虎科技有限公司 移动设备防盗处理方法及设备
CN103813315A (zh) * 2014-03-05 2014-05-21 上海优思通信科技有限公司 移动通讯终端数据保护方法

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7474894B2 (en) * 2004-07-07 2009-01-06 At&T Mobility Ii Llc System and method for IMEI detection and alerting
CN103379478B (zh) * 2012-04-25 2015-05-27 腾讯科技(深圳)有限公司 一种控制方法、***、客户端和服务器
CN103702318A (zh) * 2013-12-13 2014-04-02 北京奇虎科技有限公司 移动终端防盗方法及客户端

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1395407A (zh) * 2001-07-05 2003-02-05 致福股份有限公司 移动电话防盗窃的设定及其运作方法
US20080081609A1 (en) * 2006-09-29 2008-04-03 Motorola, Inc. Method and system for associating a user profile to a sim card
CN103648089A (zh) * 2013-11-07 2014-03-19 北京奇虎科技有限公司 移动设备防盗处理方法及设备
CN103813315A (zh) * 2014-03-05 2014-05-21 上海优思通信科技有限公司 移动通讯终端数据保护方法

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105657709A (zh) * 2016-02-24 2016-06-08 惠州Tcl移动通信有限公司 云端化网络化移动终端及其通信方法和云通信***
CN105657709B (zh) * 2016-02-24 2019-09-24 惠州Tcl移动通信有限公司 云端化网络化移动终端及其通信方法和云通信***
CN105635488A (zh) * 2016-03-17 2016-06-01 广东欧珀移动通信有限公司 一种移动终端防盗处理的方法及设备
CN105704697A (zh) * 2016-03-25 2016-06-22 广东欧珀移动通信有限公司 网络侧实现移动设备丢失报警的方法和***
CN113407364A (zh) * 2021-06-25 2021-09-17 青岛海信移动通信技术股份有限公司 应用程序的调用服务方法、装置、电子设备及存储介质
CN113543023A (zh) * 2021-07-29 2021-10-22 展讯半导体(成都)有限公司 一种定位方法及通信装置
CN113543023B (zh) * 2021-07-29 2022-08-02 展讯半导体(成都)有限公司 一种定位方法及通信装置

Also Published As

Publication number Publication date
CN105578451A (zh) 2016-05-11

Similar Documents

Publication Publication Date Title
WO2015131705A1 (zh) 一种防盗方法、防盗装置及计算机存储介质
US10355865B1 (en) Systems and techniques for certification of trusted media data
TWI636412B (zh) 針對應用程式的驗證方法、終端和系統
EP3075177B1 (en) Method, apparatus and device for exchanging name card
US10367789B2 (en) Data synchronization method and apparatus
WO2015101320A1 (zh) 一种账号的生成方法、终端及后台服务器
TW201328395A (zh) 用於刪除手機記憶體資料的裝置
CN103914520B (zh) 数据查询方法、终端设备和服务器
CN106664308B (zh) 注册之前的设备验证
KR20160034839A (ko) 파일 백업 방법, 장치, 프로그램 및 기록매체
WO2015085146A1 (en) Synchronizing content between devices
WO2014111022A1 (zh) 一种移动终端用户信息的显示方法、移动终端和服务***
EP3244320A1 (en) File path storing and local file accessing method and device
WO2017076051A1 (zh) 一种获取超级用户权限的方法及装置
CN103281375A (zh) 一种第三方应用的联系人管理方法及装置、***
US20140310780A1 (en) Communication system
CN105204962B (zh) 一种数据备份方法、装置及服务器
CN109753379B (zh) 快照数据备份、删除方法、装置及***
WO2015117356A1 (zh) 一种开机方法及通信终端
WO2018103370A1 (zh) ***重置方法、装置及电子设备
CN106911653B (zh) 一种实现移动终端远程控制的方法、装置、移动终端及***
WO2012126241A1 (zh) 用户信息的管理方法和设备
WO2021233351A1 (zh) 数据转移方法及装置、终端和计算机可读存储介质
CN106937281B (zh) 一种终端应用的管理方法、装置、终端及服务器
WO2017166780A1 (zh) 一种用户终端信息删除方法、装置及电子设备

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15757675

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15757675

Country of ref document: EP

Kind code of ref document: A1