CN103716791B - Anti-theft method for mobile terminal and client - Google Patents

Anti-theft method for mobile terminal and client Download PDF

Info

Publication number
CN103716791B
CN103716791B CN201310686970.7A CN201310686970A CN103716791B CN 103716791 B CN103716791 B CN 103716791B CN 201310686970 A CN201310686970 A CN 201310686970A CN 103716791 B CN103716791 B CN 103716791B
Authority
CN
China
Prior art keywords
antitheft
mobile terminal
theft modes
theft
account
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310686970.7A
Other languages
Chinese (zh)
Other versions
CN103716791A (en
Inventor
黄铮
张炅轩
镡云宇
宋宛芸
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Qizhi Software Beijing Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201310686970.7A priority Critical patent/CN103716791B/en
Publication of CN103716791A publication Critical patent/CN103716791A/en
Priority to PCT/CN2014/093636 priority patent/WO2015085940A1/en
Application granted granted Critical
Publication of CN103716791B publication Critical patent/CN103716791B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention provides a kind of anti-theft method for mobile terminal and client.Wherein, the method includes:Receive the antitheft instruction from PC PC terminal;Antitheft instruction is parsed, the corresponding antitheft order of the instruction is obtained;The corresponding operation of antitheft order is performed, to realize guarding against theft for mobile terminal.The embodiment of the present invention can reach non-opening anti-theft function mobile terminal it is stolen after antitheft operation is effectively carried out to the mobile terminal, and reduce stealing crime rate, the beneficial effect of protection user's property safety.

Description

Anti-theft method for mobile terminal and client
Technical field
The present invention relates to internet, applications field, more particularly to a kind of anti-theft method for mobile terminal and client.
Background technology
With developing rapidly for intelligent mobile terminal and network, mobile terminal(Including plurality of devices such as mobile phone, flat boards) In people's life, role is also more and more important, indispensable comprehensive in increasingly becoming people's work and living " assistant ".For convenience of using, various account informations, private chat would generally be recorded by people in the application using mobile terminal And the information such as picture photo is stored directly in mobile terminal.Therefore, if mobile terminal is lost, not only property can be brought to user Loss, what is more important user are stored in the financial information such as the personal information in mobile terminal, such as account number cipher.These are private If people's information is compromised, the loss that user causes is difficult to estimate.Therefore, mobile terminal is antitheft particularly significant.
In prior art, after mobile terminal is stolen, mobile terminal can continue to use in stealer side.Steal Person prevents the owner of lost property from giving stolen mobile terminal for change by carrying out brush machine to mobile terminal or extracting the operation such as battery of mobile terminal, and The owner of lost property cannot be protected to mobile terminal after terminal is stolen.When stealer is traded to stolen terminal, the owner of lost property cannot Give stolen terminal for change, cause property loss, also, the subscriber datas such as the data in mobile terminal are stored in mobile terminal Lose and lose and even cause more incalculable damages.
To sum up, after in prior art, mobile terminal is stolen, it is impossible to which it is indirect that continuation carries out antitheft defect to mobile terminal Encourage the pilferage behavior of stealer, it is impossible to the ill effect such as effectively containment pilferage crime, and cause the user property loss.
The content of the invention
In view of the above problems, it is proposed that the present invention so as to provide one kind overcome the problems referred to above or at least in part solve on State the anti-theft method for mobile terminal and corresponding client of problem.
According to one aspect of the present invention, there is provided a kind of anti-theft method for mobile terminal, including:Receive from PC The antitheft instruction of PC terminals;The antitheft instruction is parsed, the corresponding antitheft order of the instruction is obtained;Perform the antitheft order right The operation answered, to realize guarding against theft for mobile terminal.
Alternatively, the antitheft instruction is parsed, obtains the corresponding antitheft order of the instruction, including:Parse the antitheft finger Order, the identity of this mobile terminal carried in obtaining the antitheft instruction;The identity is verified;If checking Pass through, then that triggers the antitheft order performs operation;If checking does not pass through, stop response.
Alternatively, the identity of described mobile terminal includes:The International Mobile Equipment Identity of described mobile terminal Identification code IMEI.
Alternatively, it is described reception before the antitheft instruction of PC terminals, including:Receive the activation from the PC terminals File, wherein, the activation file carries the identity of described mobile terminal and anti-theft modes mark;According to described Identity is verified to the activation file;If being verified, activation is identified according to the anti-theft modes different antitheft Pattern.
Alternatively, identified according to the anti-theft modes and determine different anti-theft modes, including:If the anti-theft modes mark Identify for PC anti-theft modes, then start the antitheft strategies of PC;If the anti-theft modes are designated account anti-theft modes mark, start The antitheft strategy of account.
Alternatively, the anti-theft modes mark includes at least one following:The PC terminals are generated, and this mobile terminal One-to-one random string GUID;Account identifier UID for identifying account generated after User logs in account, its In, the entitled USERNAME of account of the User logs in of UID;Password PASSWORD.
Alternatively, identified according to the anti-theft modes and determine different anti-theft modes, including:If the anti-theft modes mark When only including the GUID, the antitheft strategies of PC are opened, directly perform the corresponding operation of the antitheft order;If the anti-theft modes When mark includes the GUID and PASSWORD, the antitheft strategies of PC are opened, verify whether the PASSWROD is correct;If It is then to perform the corresponding operation of the antitheft order;If it is not, then stopping response;If the anti-theft modes mark includes the UID When, the antitheft strategy of account is opened, the USERNAME is logged in described mobile terminal, received from the antitheft of the UID Order and perform corresponding operation;If the anti-theft modes mark includes the GUID and UID, the antitheft strategies of PC are opened And the antitheft strategy of account, receive the antitheft order from PC terminals or the UID and perform corresponding operation;If described anti- Stealing pattern identification includes the GUID, the UID and the PASSWORD, opens the antitheft strategies of PC and the antitheft strategy of account, Receive the antitheft order from the PC terminals or the UID to verify the PASSWORD;If being verified, The corresponding operation of antitheft order of reception is performed then;If checking does not pass through, stop response.
Alternatively, the anti-theft method for mobile terminal also includes:During any operation is performed, poll inquiry its Whether run succeeded;If so, then terminate the operation;If it is not, then again attempting to perform the operation.
Alternatively, after performing the corresponding operation of the antitheft order, also include:Return implementing result as receipt to institute PC terminals are stated, wherein, if the PC terminals within a specified time do not receive the receipt, poll inquiry is initiated, whether inquiry Receipt success;If so, then terminate receipt inquiry;If it is not, then asking receipt again.
Alternatively, the PC terminals are connected by wired or wireless way with this mobile terminal and are got through, wherein, it is described to have Line mode includes general-purpose serial bus USB connecting line, and the wireless mode includes wireless network.
According to another aspect of the present invention, a kind of guarding against theft for mobile terminal client is additionally provided, including:Receiver module, It is configured to receive the antitheft instruction from PC PC terminal;Parsing module, is configured to the parsing antitheft instruction, is somebody's turn to do Instruct corresponding antitheft order;Performing module, is configured to perform the corresponding operation of the antitheft order, to realize that mobile terminal is prevented Steal.
Alternatively, the parsing module is additionally configured to:The antitheft instruction is parsed, is carried in obtaining the antitheft instruction The identity of this mobile terminal;The identity is verified;If being verified, holding for the antitheft order is triggered Row operation;If checking does not pass through, stop response.
Alternatively, the identity of described mobile terminal includes:The International Mobile Equipment Identity of described mobile terminal Identification code IMEI.
Alternatively, the guarding against theft for mobile terminal client also includes:Active module, is configured to:Receive from the PC ends The activation file at end, wherein, the activation file carries the identity of described mobile terminal and anti-theft modes mark; The activation file is verified according to the identity;If being verified, according to the activation of anti-theft modes mark not Same anti-theft modes.
Alternatively, the active module is additionally configured to:If the anti-theft modes are designated PC anti-theft modes mark, start The antitheft strategies of PC;If the anti-theft modes are designated account anti-theft modes mark, start the antitheft strategy of account.
Alternatively, the anti-theft modes mark includes at least one following:The PC terminals are generated, and this mobile terminal One-to-one random string GUID;Account identifier UID for identifying account generated after User logs in account, its In, the entitled USERNAME of account of the User logs in of UID;Password PASSWORD.
Alternatively, the active module is additionally configured to:If the anti-theft modes mark only includes the GUID, PC is opened Antitheft strategy, directly performs the corresponding operation of the antitheft order;If anti-theft modes mark includes the GUID and described During PASSWORD, the antitheft strategies of PC are opened, verify whether the PASSWROD is correct;If so, then perform the antitheft order right The operation answered;If it is not, then stopping response;If the anti-theft modes mark includes the UID, the antitheft strategy of account is opened, The USERNAME is logged in described mobile terminal, the antitheft order from the UID is received and is performed corresponding operation;If When the anti-theft modes mark includes the GUID and UID, the antitheft strategies of PC and the antitheft strategy of account are opened, is received and From the antitheft order of PC terminals or the UID and perform corresponding operation;If anti-theft modes mark include the GUID, The antitheft strategy of the UID and PASSWORD, the PC that opens an account and the antitheft strategy of account, receive from the PC terminals or The antitheft order of the UID is verified to the PASSWORD;If being verified, the antitheft order correspondence of reception is performed Operation;If checking is not notified, stop response.
Alternatively, also including poller module, it is configured to:During any operation is performed, poll inquiry its whether Run succeeded;If so, then terminate the operation;If it is not, then again attempting to perform the operation.
Alternatively, the guarding against theft for mobile terminal client also includes:Interface, is configured to pass wired or wireless way connection The PC terminals and this mobile terminal, wherein, the wired mode includes general-purpose serial bus USB connecting line, the wireless parties Formula includes wireless network.
In embodiments of the present invention, the antitheft instruction from PC terminals is received, and antitheft life is obtained by parsing antitheft instruction Order, and according to antitheft order, it is able to carry out corresponding antitheft operation.As can be seen here, the antitheft instruction in the embodiment of the present invention From PC terminals can be used, on the premise of the non-opening anti-theft function of stolen mobile terminal, open and using mobile terminal Anti-theft feature.Antitheft instruction is sent using PC terminals, it is simple to operate such that it is able to conveniently and efficiently to realize the anti-of mobile terminal Steal, and can provide perfect anti-theft feature carries out antitheft to mobile terminal, solves in prior art, and mobile terminal is stolen Afterwards, it is impossible to which continuation carries out antitheft problem to mobile terminal.The embodiment of the present invention is still able to after mobile terminal is stolen The antitheft instruction of sender is received, and antitheft operation is performed according to the antitheft order for parsing antitheft instruction acquisition.For example, user After mobile terminal is lost, instruct to stolen mobile terminal by transmission is antitheft, the embodiment of the present invention can be to stolen mobile whole End carries out screen locking operation, prevents stealer from using mobile terminal.Stealer cannot cause stealer lead to using mobile terminal The operation renovation mobile terminal such as brush machine is crossed, and then stolen mobile terminal cannot be resell and be earned a profit by stealer.Further, can The probability that stealing crime occurs is reduced effectively.In addition, according to the antitheft instruction for receiving, the embodiment of the present invention can also be obtained steathily The identification information of robber person(The such as photo of stealer, fingerprint etc.).The identity of stealer is got according to embodiments of the present invention After identification information, stealer can be arrested according to above-mentioned identification information.Therefore, the embodiment of the present invention can reach To terminal it is stolen after effectively terminal is carried out antitheft, and reduce stealing crime rate, the beneficial effect of protection user's property safety Really.
Described above is only the general introduction of technical solution of the present invention, in order to better understand the technological means of the present invention, And can be practiced according to the content of description, and in order to allow the above and other objects of the present invention, feature and advantage can Become apparent, below especially exemplified by the specific embodiment of the present invention.
According to the detailed description below in conjunction with accompanying drawing to the specific embodiment of the invention, those skilled in the art will be brighter The above-mentioned and other purposes of the present invention, advantages and features.
Description of the drawings
By the detailed description for reading hereafter preferred implementation, various other advantages and benefit are common for this area Technical staff will be clear from understanding.Accompanying drawing is only used for the purpose for illustrating preferred implementation, and is not considered as to the present invention Restriction.And in whole accompanying drawing, it is denoted by the same reference numerals identical part.In the accompanying drawings:
Fig. 1 shows the process chart of anti-theft method for mobile terminal according to an embodiment of the invention;
Fig. 2 shows the place of the method for the anti-theft feature that Activates Phone of PC terminals side according to an embodiment of the invention Reason flow chart;
Fig. 3 shows the process chart of the theft preventing method according to one embodiment of the invention mobile phone side;And
Fig. 4 shows the structural representation of guarding against theft for mobile terminal client according to an embodiment of the invention.
Specific embodiment
The exemplary embodiment of the disclosure is more fully described below with reference to accompanying drawings.Although the disclosure is shown in accompanying drawing Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure and should not be by embodiments set forth here Limited.On the contrary, there is provided these embodiments are able to be best understood from the disclosure, and can be by the scope of the present disclosure Complete conveys to those skilled in the art.
Refer in correlation technique, after mobile terminal is stolen, it is impossible to which it is indirect that continuation carries out antitheft defect to mobile terminal Encourage the pilferage behavior of stealer, it is impossible to the ill effect such as effectively containment pilferage crime, and cause the user property loss.
To solve above-mentioned technical problem, a kind of anti-theft method for mobile terminal is embodiments provided.Fig. 1 shows root According to the process chart of the anti-theft method for mobile terminal of one embodiment of the invention.Referring to Fig. 1, the flow process at least includes step S102 is to step S106.
Step S102, reception are from PC(Personal Computer, hereinafter referred to as PC)The antitheft finger of terminal Order.
Step S104, the antitheft instruction of parsing, obtain the corresponding antitheft order of the instruction.
Step S106, the corresponding operation of the antitheft order of execution, to realize guarding against theft for mobile terminal.
In embodiments of the present invention, the antitheft instruction from PC terminals is received, and antitheft life is obtained by parsing antitheft instruction Order, and according to antitheft order, it is able to carry out corresponding antitheft operation.As can be seen here, the antitheft instruction in the embodiment of the present invention From PC terminals can be used, on the premise of the non-opening anti-theft function of stolen mobile terminal, open and using mobile terminal Anti-theft feature.Antitheft instruction is sent using PC terminals, it is simple to operate such that it is able to conveniently and efficiently to realize the anti-of mobile terminal Steal, and can provide perfect anti-theft feature carries out antitheft to mobile terminal, solves in prior art, and mobile terminal is stolen Afterwards, it is impossible to which continuation carries out antitheft problem to mobile terminal.The embodiment of the present invention is still able to after mobile terminal is stolen The antitheft instruction of sender is received, and antitheft operation is performed according to the antitheft order for parsing antitheft instruction acquisition.For example, user After mobile terminal is lost, instruct to stolen mobile terminal by transmission is antitheft, the embodiment of the present invention can be to stolen mobile whole End carries out screen locking operation, prevents stealer from using mobile terminal.Stealer cannot cause stealer lead to using mobile terminal The operation renovation mobile terminal such as brush machine is crossed, and then stolen mobile terminal cannot be resell and be earned a profit by stealer.Further, can The probability that stealing crime occurs is reduced effectively.In addition, according to the antitheft instruction for receiving, the embodiment of the present invention can also be obtained steathily The identification information of robber person(The such as photo of stealer, fingerprint etc.).The identity of stealer is got according to embodiments of the present invention After identification information, stealer can be arrested according to above-mentioned identification information.Therefore, the embodiment of the present invention can reach To terminal it is stolen after effectively terminal is carried out antitheft, and reduce stealing crime rate, the beneficial effect of protection user's property safety Really.
Before step S102 as shown in Figure 1 is performed, i.e. received before the antitheft instruction of PC terminals, receive and From PC terminals, the identity that carries this mobile terminal and anti-theft modes mark activation file.Preferably, the present invention Activation file in embodiment is by expandable mark language XML or the data interchange format of lightweight(JavaScript Object Notation, hereinafter referred to as JSON)Composition, for the activation manipulation between PC terminals and mobile terminal.Receive activation After file, the embodiment of the present invention is tested to activating file according to the identity of the mobile terminal carried in activation file Card.If the identity of the mobile terminal carried in activation file is the identity of this mobile terminal, activation file passes through Checking.If the identity of the mobile terminal carried in activation file is not the identity of this mobile terminal, file is activated It is not verified.In view of PC terminals in addition to the attribute for possessing equipment, the characteristics such as online are also equipped with, therefore, PC terminals are suitable for model Enclose relatively wide, different anti-theft modes can be triggered.After activation file is by checking, the embodiment of the present invention can be according to activation The anti-theft modes mark that file is carried confirms this anti-theft modes for being adopted in different anti-theft modes.
Because anti-theft modes have multiformity, anti-theft modes mark also accordingly exists various.Conversely speaking, can be according to different preventing The different information that pattern identification includes are stolen, different anti-theft modes are distinguished.Different anti-theft modes are provided in the embodiment of the present invention The illustration of mark, specifically, can include:
Only include by PC generate, and the one-to-one random string GUID of this mobile terminal first group of anti-theft modes Mark, including GUID and password(PASSWORD)Second group of anti-theft modes mark, only include account identifier(UID)The 3rd Group anti-theft modes mark, the 4th group of anti-theft modes including GUID and UID are identified and while including GUID, UID, PASSWORD The 5th group of anti-theft modes mark of three.
Now different to five groups anti-theft modes marks and its effect are illustrated respectively.
When anti-theft modes are designated first group of anti-theft modes mark only including GUID, the antitheft strategies of PC, and root are opened Corresponding antitheft operation is performed directly according to the antitheft order for receiving.Wherein, GUID is the random string that PC is generated, and should Character string can set up one-to-one binding relationship with mobile terminal.
When anti-theft modes are designated second group of anti-theft modes mark including GUID and PASSWORD, the antitheft plans of PC are opened Slightly, and whether PASSWORD is correctly verified.If so, then perform the corresponding antitheft operation of the antitheft order for receiving.If It is no, then stop response, do not perform any operation.Wherein, the password that the PASSWORD is pre-set for user, when the password value not For space-time, the embodiment of the present invention is verified to the PASSWORD before antitheft order is performed.
When anti-theft modes are designated the 3rd group of anti-theft modes mark only including UID, the antitheft strategy of account is opened.Its In, UID is the account identifier for identifying account that generates after the account of the entitled USERSNAME of User logs in account.
When anti-theft modes are designated the 4th group of anti-theft modes mark including UID and GUID, the antitheft strategies of PC are opened And the antitheft strategy of account, receive the antitheft instruction from PC terminals or UID and perform corresponding antitheft operation.
When anti-theft modes are designated while when identifying including the 5th group of anti-theft modes of GUID, UID, PASSWORD three, Open the antitheft strategies of PC and the antitheft strategy of account.Also, receive from being required to during the antitheft order of PC terminals or UID First PASSWORD is verified.Secondly, whether next step operation is carried out by checking according to PASSWORD.Specifically, when By when, the embodiment of the present invention performs the corresponding antitheft operation of antitheft order that receives, when obstructed out-of-date, the embodiment of the present invention Stop response, do not perform any operation.
As described above, the difference for activating the anti-theft modes mark carried in file for being sent according to PC terminals, the present invention Embodiment can activate different anti-theft modes.That is, when antitheft operation is carried out by PC terminal-pairs mobile terminal, by PC ends End can be triggered a kind of antitheft strategy and be sent antitheft order to mobile terminal, can also trigger various antitheft strategies while to movement Terminal sends antitheft order.For example, when the anti-theft modes in file is activated are designated, The embodiment of the present invention can only carry out the antitheft strategy of account respectively or only carry out the antitheft strategies of PC.When antitheft in activation file Pattern identification for simultaneously including UID and GUID when, the embodiment of the present invention can carry out that PC is antitheft and account is antitheft simultaneously, increase The strong anti-theft protection to mobile terminal, increase give the probability of mobile terminal for change.In the embodiment of the present invention, PC is antitheft including passing through PC terminals send it is antitheft instruct to mobile terminal mobile terminal is carried out it is antitheft, also including activation account account is carried out to mobile terminal It is number antitheft.When PC terminals activation account mobile terminal is carried out account it is antitheft when, PC terminals only account information is sent to as In the mobile terminal of login side.
In the embodiment of the present invention, the difference of the antitheft strategies of PC strategy antitheft with account has:In the antitheft strategies of PC ACTIONID needs to distinguish with the ACTIONID in account anti-theft strategy." positioning " for example in account anti-theft strategy, ACTIONID is LOCATE, and plants in the antitheft strategies of PC and should be " LOCATE_PC ", but the operation for performing is identical.UID is in PC It is GUID in antitheft strategy.That is, the information of the unique account in labelling account anti-theft is UID, and unique during labelling PC is antitheft The information of computer be GUID.If anti-theft modes are designated the side identified including the anti-theft modes of GUID and PASSWORD Formula, namely send order and need password, then in the OTHERS of each order, add PASSWORD parts(The field can be attached to It is last).Such as " removing data in mobile phone "<OTHERS>In can be " 3, PASSWORD:123123123 ", wherein " 3 " represent Data in mobile phone type to be removed, and " PASSWORD:" below be exactly password.Stolen side is after order is received, if passed through When PC is activated, existing password, then, in the order sent, should also take out<OTHERS>Part, takes out " PASSWORD:" below close Code is contrasted.If identical, then it represents that order is correct, user cipher input error be otherwise likely to be, or order is It is tampered.
In addition, in the embodiment of the present invention, personal settings can be carried out to PASSWORD.If user arranges PASSWORD, Before antitheft operation is performed, the PASSWORD is verified, malicious peer can be avoided to send antitheft instruction causes movement End-error performs antitheft operation(Such as malice screen locking, reveal real-time position information etc.)Cause severe consequence.User can also The setting of PASSWORD is not carried out as needed, terminal anti-theft is moved by PC or account directly, it is to avoid complex steps.No PASSWORD checkings are needed to be generally used for network environment trusty or conventional trusted terminal, such as family computer, office's electricity The equipment such as brain.
In the embodiment of the present invention, according to the corresponding antitheft mould of anti-theft modes mark activation in the activation file by checking After formula, step S102 as shown in Figure 1 is performed, receive the antitheft instruction from PC terminals.After receiving, execution step S104, the antitheft instruction to receiving are parsed, the identity of this mobile terminal carried in obtaining antitheft instruction.Obtain After the identity of this mobile terminal carried in antitheft instruction, the embodiment of the present invention is verified to identity.If testing Card passes through, then perform step S106 as shown in Figure 1, performs the corresponding operation of antitheft order, to realize guarding against theft for mobile terminal.If Checking does not pass through, then the embodiment of the present invention stops response, does not perform any operation.
In the embodiment of the present invention, it is arbitrary it is antitheft order be performed during, poll inquiry this it is antitheft order whether hold Go successfully, if so, then terminate the execution of the antitheft order, if it is not, then again attempting to perform the antitheft order.The embodiment of the present invention In, the implementation status of antitheft order is polled inquiry ensure acquisition for mobile terminal to antitheft order can be held in time OK, it is to avoid order execution to cause stealer that brush machine or other operations are carried out to mobile terminal so that mobile whole not in time because antitheft End cannot be retrieved.For example, the embodiment of the present invention will perform lock-screen order, and whether the lock-screen order is performed into Work(is inquired about.If lock-screen order is not carried out, the embodiment of the present invention performs lock-screen order, the screen to mobile terminal Curtain is locked.If lock-screen order runs succeeded, the embodiment of the present invention is abandoned performing the screen locking order again.
In the embodiment of the present invention, the identity of mobile terminal can be user identification module(Subscriber Identity Module, hereinafter referred to as SIM)Card number, can be that hardware configuration information of mobile terminal etc. arbitrarily uniquely can be marked Know the identification information of mobile terminal.Preferably, the embodiment of the present invention is known using the International Mobile Equipment Identity of mobile terminal Other code(International Mobile Equipment Identity, hereinafter referred to as IMEI)As this mobile terminal Identity, IMEI itself and mobile terminal are lifelong bindings and unique constant, and recognizability is high, therefore, this In inventive embodiments, preferred IMEI is the unique identity of this mobile terminal.
In addition, in the embodiment of the present invention, PC terminals can be connected by wired or wireless mode with this mobile terminal beats It is logical.For example, PC terminals can pass through USB (universal serial bus) with this mobile terminal(Universal Serial Bus, hereinafter referred to as USB)Data wire is attached.Again for example, PC terminals can be entered by wireless modes such as bluetooth, wireless networks with this mobile terminal Row connection.In the embodiment of the present invention, PC terminals can be attached and be beaten by wired or wireless mode with this mobile terminal It is logical, facilitate PC terminals and mobile terminal in several ways or means are attached and get through, and then PC ends can be passed through End carries out antitheft to mobile terminal, and the safety of mobile terminal is effectively ensured.
Now the anti-theft method for mobile terminal of the present invention is illustrated with specific embodiment.
Embodiment one
Fig. 2 and Fig. 3 show the process chart of anti-theft method for mobile terminal in accordance with a preferred embodiment of the present invention, For supporting above-mentioned any one anti-theft method for mobile terminal, above-mentioned anti-theft method for mobile terminal is illustrated and must be become apparent from easily Understand.It should be noted that being to illustrate simpler clear by this preferred embodiment, mobile terminal is set in this preferred embodiment It is set to mobile phone.
Fig. 2 shows the place of the method for the anti-theft feature that Activates Phone of PC terminals side according to an embodiment of the invention Reason flow chart.Referring to Fig. 2, the flow process at least includes step S202 to step S216.
Step S202, judge PC terminals are connected with whether mobile phone is set up.If so, execution step S204, if it is not, flow process knot Beam.
Step S204, the identity IMEI for obtaining mobile phone.
Step S206, judge whether User logs in account activates.If it is not, execution step S208, if so, execution step S210。
Step S208, to server send PC binding(Bind_By_PC)Instruction.
If according to the judged result of step S206, User logs in account un-activation, then triggering the antitheft strategies of PC, by PC ends End directly transmit it is antitheft instruct to server, or, in input PASSWORD and by checking after, transmission antitheft is instructed to clothes Business device.Wherein, the form of the antitheft instruction can include order numbering(ACTIONID), mission number(TASKID)And it is additional Information(OTHERS).For example, ACTIONID is Bind_By_PC, and TASKID is GUID, IMEI and password three for 0 and OTHERS Person.
Step S210, to server send Bind instruction.
If according to the judged result of step S206, User logs in account is activated, then trigger the antitheft strategy of account.
Step S212, generation activation file.
Generation carries the IMEI and anti-theft modes mark activation file of mobile phone.Wherein, prevent if only needing mobile phone to open PC Steal, then anti-theft modes are designated only including GUID or including GUID and PASSWORD.If only needing mobile phone unlatching account antitheft, Anti-theft modes are designated.If mobile phone needs, and unlatching PC is antitheft and account is antitheft, anti-theft modes mark includes GUID and UID or while including GUID, UID and PASSWORD three.
Step S214, will activation file send to mobile phone.
Step S216, notice mobile phone read activation file and open.
Specifically, read in mobile phone Android system and activate file and the step of opening be:Launching process, its process name and Parameter is:adb shell am start-a BIND_FROM_PC-ncom.qihoo360.mobilesafe/ com.qihoo360.mobilesafe.PortalActivity-d/mnt/sdcard/Protection.dat.Wherein:BIND_ FROM_PC represents the Action of an Intent.Com.qihoo360.mobilesafe represents the bag name of ARIXTRA application. Com.qihoo360.PortalActivity represents real for processing the Activity of activation./mnt/sdcard/ Protection.dat represents the path for getting through that file is put.
Fig. 3 shows the process chart of the theft preventing method according to one embodiment of the invention mobile phone side.Referring to Fig. 3, The flow process at least includes step S302 to step S324.
Step S302, the activation instruction for receiving the transmission of PC terminals, judge its legitimacy.
After mobile phone receives the activation instruction of PC terminals transmission, judge whether the order in activation instruction is Bind_ From_PC, and the field in instruction is obtained, check that whether the field is the path of complete activation file.If in activation instruction Order be Bind_From_PC, then decision instruction is legal, execution step S304, if illegal, flow process terminates.
Step S304, parsing activation file, the IMEI carried in obtaining activation file.
Step S306, judge that IMEI is whether correct, if so, execution step S308, if it is not, execution step S310.
The anti-theft modes mark carried in step S308, reading activation file, and preserve.
Following information is being preserved locally:
When anti-theft modes are identified only includes GUID, the antitheft strategies of PC are opened, directly perform the corresponding operation of antitheft order.
When anti-theft modes mark includes GUID and PASSWORD, the antitheft strategies of PC are opened, whether just checking PASSWROD Really;If so, then perform the corresponding operation of antitheft order;If it is not, then stopping response.
When anti-theft modes mark includes UID, the antitheft strategy of account is opened, USERNAME is logged in this mobile terminal, Receive the antitheft order from UID and perform corresponding operation.
When anti-theft modes mark include GUID and UID when, open PC it is antitheft strategy and the antitheft strategy of account, reception from The antitheft order of PC terminals or UID simultaneously performs corresponding operation.
When anti-theft modes mark includes GUID, UID and PASSWORD, the antitheft strategies of PC and the antitheft strategy of account are opened, Receive from PC terminals or state the antitheft order of UID PASSWORD is verified;If being verified, reception is performed The corresponding operation of antitheft order;If checking does not pass through, stop response.
In this mobile terminal, different anti-theft modes can be opened after receiving command adapted thereto, now to mobile terminal itself How to arrange the different anti-theft modes of respective attributes value unlatching to illustrate.
When anti-theft modes are identified only includes GUID:
1., in setting options, " the antitheft sign identifier value of PC " is set to GUID value.
2., in setting options, " opening the antitheft values of PC " is true.
When anti-theft modes mark includes GUID and PASSWORD:
1., in setting options, " the antitheft sign identifier value of PC " is set to GUID value.
2., in setting options, " PC anti-theft cipher values " is password value.
3., in setting options, " opening the antitheft values of PC " is true.
When anti-theft modes mark includes UID:
1., in setting options, " account number identity value " is set to UID values.
2., in setting options, " account number name value " is set to USERNAME values.
3., in setting options, " opening account anti-theft value " is True.
Note:" opening the antitheft values of PC " is not provided with herein, because it is antitheft to be not turned on PC.
When anti-theft modes mark includes GUID and UID:
1., in setting options, " the antitheft sign identifier value of PC " is GUID value.
2., in setting options, " account number identity value " is UID values.
3., in setting options, " account number name value " is set to USERNAME values.
4., in setting options, " opening account anti-theft value " is true.
5., in setting options, " opening the antitheft values of PC " is true.
When anti-theft modes mark includes GUID, UID and PASSWORD:
1., in setting options, " the antitheft sign identifier value of PC " is GUID value.
2., in setting options, " PC anti-theft cipher values " is password value.
3., in setting options, " account number identity value " is UID values.
4., in setting options, " account number name value " is set to USERNAME values.
5., in setting options, " opening account anti-theft value " is true.
6., in setting options, " opening the antitheft values of PC " is true.
When anti-theft modes mark includes other situations, by failure handling.
Step S310, the failure of opening anti-theft function.
Step S312, opening anti-theft function success.
Step S314, the antitheft instruction for receiving the transmission of PC terminals.
Step S316, the antitheft instruction of parsing, obtain antitheft order and identity.
Step S318, the identity to carrying in antitheft instruction are verified.If being verified, execution step S320, If checking does not pass through, flow process terminates.
Step S320, the corresponding operation of the antitheft order of execution.
Whether the antitheft order of step S322, poll inquiry runs succeeded.If so, execution step S324, if it is not, continuing executing with The step.
Step S324, antitheft order run succeeded, and return implementing result to PC terminals, and flow process terminates.
Based on the anti-theft method for mobile terminal that each preferred embodiment is provided above, based on same inventive concept, the present invention is real Apply example and a kind of guarding against theft for mobile terminal client is provided, for realizing above-mentioned anti-theft method for mobile terminal.
Fig. 4 shows the structural representation of guarding against theft for mobile terminal client according to an embodiment of the invention.Referring to figure 4, the client of the embodiment of the present invention at least includes:Receiver module 430, parsing module 440 and performing module 450.
The function and each several part of each device or composition of the guarding against theft for mobile terminal client of the embodiment of the present invention are introduced now Between annexation:
Receiver module 430, is configured to receive the antitheft instruction from PC terminals.
Parsing module 440, is coupled with receiver module 430, is configured to parse antitheft instruction, obtains the instruction corresponding anti- Steal order.
Performing module 450, is coupled with parsing module 440, is configured to perform the corresponding operation of antitheft order, to realize moving Dynamic terminal anti-theft.
In embodiments of the present invention, the antitheft instruction from PC terminals is received, and antitheft life is obtained by parsing antitheft instruction Order, and according to antitheft order, it is able to carry out corresponding antitheft operation.As can be seen here, the antitheft instruction in the embodiment of the present invention From PC terminals can be used, on the premise of the non-opening anti-theft function of stolen mobile terminal, open and using mobile terminal Anti-theft feature.Antitheft instruction is sent using PC terminals, it is simple to operate such that it is able to conveniently and efficiently to realize the anti-of mobile terminal Steal, and can provide perfect anti-theft feature carries out antitheft to mobile terminal, solves in prior art, and mobile terminal is stolen Afterwards, it is impossible to which continuation carries out antitheft problem to mobile terminal.The embodiment of the present invention is still able to after mobile terminal is stolen The antitheft instruction of sender is received, and antitheft operation is performed according to the antitheft order for parsing antitheft instruction acquisition.For example, user After mobile terminal is lost, instruct to stolen mobile terminal by transmission is antitheft, the embodiment of the present invention can be to stolen mobile whole End carries out screen locking operation, prevents stealer from using mobile terminal.Stealer cannot cause stealer lead to using mobile terminal The operation renovation mobile terminal such as brush machine is crossed, and then stolen mobile terminal cannot be resell and be earned a profit by stealer.Further, can The probability that stealing crime occurs is reduced effectively.In addition, according to the antitheft instruction for receiving, the embodiment of the present invention can also be obtained steathily The identification information of robber person(The such as photo of stealer, fingerprint etc.).The identity of stealer is got according to embodiments of the present invention After identification information, stealer can be arrested according to above-mentioned identification information.Therefore, the embodiment of the present invention can reach To terminal it is stolen after effectively terminal is carried out antitheft, and reduce stealing crime rate, the beneficial effect of protection user's property safety Really.
Receiver module 430 was received before the antitheft instruction of PC terminals, active module 420 receive from PC terminals, Carry the identity of this mobile terminal and the activation file of anti-theft modes mark.After receiving activation file, activation Module 420 is verified to activating file according to the identity of the mobile terminal carried in activation file.If in activation file The identity of the mobile terminal of carrying is the identity of this mobile terminal, then activate file by checking.If activation file The identity of the mobile terminal of middle carrying is not the identity of this mobile terminal, then activate file not verified.When sharp After file living is by checking, active module 420 determines different antitheft moulds according to the anti-theft modes mark that activation file is carried Formula.
According to the different information that different antitheft pattern identifications include, anti-theft modes mark being divided into and only include at random First group of anti-theft modes mark of character string GUID, including GUID and password(PASSWORD)Second group of anti-theft modes mark, Only include account identifier(UID)The 3rd group of anti-theft modes mark, including GUID and UID the 4th group of anti-theft modes mark with And while including the 5th group of anti-theft modes mark of GUID, UID, PASSWORD three.Now different to five groups anti-theft modes marks Know and its effect is illustrated respectively.
When anti-theft modes are designated first group of anti-theft modes mark only including GUID, active module 420 is opened PC and is prevented Strategy is stolen, and corresponding antitheft operation is directly performed according to the antitheft order for receiving.Wherein, GUID be PC terminals generate with Machine character string, and the character string can set up one-to-one binding relationship with mobile terminal.
When anti-theft modes are designated second group of anti-theft modes mark including GUID and PASSWORD, active module 420 The antitheft strategies of PC are opened, and whether PASSWORD is correctly verified.If so, then perform the antitheft order for receiving corresponding Antitheft operation.If it is not, then stopping response, any operation is not performed.Wherein, the password that the PASSWORD is pre-set for user, When the password value is not space-time, the embodiment of the present invention is verified to the PASSWORD before antitheft order is performed.
When anti-theft modes are designated the 3rd group of anti-theft modes mark only including UID, active module 420 is opened account and is prevented Steal strategy.Wherein, UID is the account for identifying account that generates after the account of the entitled USERSNAME of User logs in account Symbolic identifier.
When anti-theft modes are designated the 4th group of anti-theft modes mark including UID and GUID, active module 420 is opened The antitheft strategies of PC and the antitheft strategy of account, receive the antitheft instruction from PC terminals or UID and perform corresponding antitheft behaviour Make.
When anti-theft modes are designated while when identifying including the 5th group of anti-theft modes of GUID, UID, PASSWORD three, Active module 420 opens the antitheft strategies of PC and the antitheft strategy of account.Also, receive from the antitheft of PC terminals or UID It is required to verify PASSWORD during order first.Secondly, whether next step behaviour is carried out by checking according to PASSWORD Make.Specifically, when by when, the embodiment of the present invention performs the corresponding antitheft operation of antitheft order that receives, when obstructed out-of-date, The embodiment of the present invention stops response, does not perform any operation.
As described above, the difference for activating the anti-theft modes mark carried in file for being sent according to PC, the present invention are implemented Example can activate different anti-theft modes.That is, when antitheft operation is carried out by PC terminal-pairs mobile terminal, can by PC terminals Antitheft order is sent to mobile terminal to trigger a kind of antitheft strategy, various antitheft strategies can also be triggered while to mobile terminal Send antitheft order.For example, when the anti-theft modes in file is activated are designated, this Bright embodiment can only carry out the antitheft strategy of account respectively or only carry out the antitheft strategies of PC.Anti-theft modes in activation file It is designated while during including UID and GUID, the embodiment of the present invention can carry out that PC is antitheft and account is antitheft simultaneously, and it is right to strengthen The anti-theft protection of mobile terminal, increase give the probability of mobile terminal for change.
In addition, in the embodiment of the present invention, personal settings can be carried out to PASSWORD.If user arranges PASSWORD, Before antitheft operation is performed, the PASSWORD is verified, malicious peer can be avoided to send antitheft instruction causes movement End-error performs antitheft operation(Such as malice screen locking, reveal real-time position information etc.)Cause severe consequence.User can also The setting of PASSWORD is not carried out as needed, terminal anti-theft is moved by PC terminals or account directly, it is to avoid step is numerous It is trivial.
In the embodiment of the present invention, active module 420 is according to the anti-theft modes mark activation in the activation file by checking After corresponding anti-theft modes, coupled receiver module 430 is triggered.After receiver module 430 receives antitheft instruction, Trigger parsing module 440 is parsed to antitheft instruction, the identity of this mobile terminal carried in obtaining antitheft instruction, and Which is verified.If by checking, the triggering of the parsing module 440 corresponding antitheft behaviour of the antitheft order of performing module 450 pairs Performed, to realize guarding against theft for mobile terminal.If checking does not pass through, stop response, do not perform any operation.
During arbitrary antitheft order is performed, 460 poll inquiry of poller module being coupled with performing module 450 Whether the antitheft order runs succeeded, and if so, then the triggering of poller module 460 performing module 450 terminates the execution of the antitheft order, If it is not, then the triggering of poller module 460 performing module 450 again attempts to perform the antitheft order.In the embodiment of the present invention, poll mould Block 460 to the implementation status of antitheft order be polled inquiry ensure acquisition for mobile terminal to antitheft order can be held in time OK, it is to avoid order execution to cause stealer that brush machine or other operations are carried out to mobile terminal so that mobile whole not in time because antitheft End cannot be retrieved.For example, the embodiment of the present invention will perform lock-screen order, and whether the lock-screen order is performed into Work(is inquired about.If lock-screen order is not carried out, the embodiment of the present invention performs lock-screen order, the screen to mobile terminal Curtain is locked.If lock-screen order runs succeeded, the embodiment of the present invention is abandoned performing the screen locking order again.
In addition, this mobile terminal for being located of guarding against theft for mobile terminal client as shown in Figure 4 by with 420 phase of active module The interface 410 of coupling is attached with PC terminals to be got through.In the embodiment of the present invention, interface 410 can pass through wired or wireless This mobile terminal is attached with PC terminals and is got through by mode.For example, interface 410 can be entered with PC terminals by USB data line Row connection.Again for example, interface 410 can be attached by the wireless modes such as bluetooth, wireless network and PC terminals.It is of the invention real Apply in example, PC terminals can be attached and be got through by wired or wireless mode with interface 410, facilitate PC terminals and shifting Dynamic terminal is in several ways or means are attached and get through, and then mobile terminal can be carried out by PC antitheft, has Effect ensures the safety of mobile terminal.
According to the combination of above-mentioned any one preferred embodiment or multiple preferred embodiments, the embodiment of the present invention can reach Following beneficial effect:
In embodiments of the present invention, the antitheft instruction from PC terminals is received, and antitheft life is obtained by parsing antitheft instruction Order, and according to antitheft order, it is able to carry out corresponding antitheft operation.As can be seen here, the antitheft instruction in the embodiment of the present invention From PC terminals can be used, on the premise of the non-opening anti-theft function of stolen mobile terminal, open and using mobile terminal Anti-theft feature.Antitheft instruction is sent using PC terminals, it is simple to operate such that it is able to conveniently and efficiently to realize the anti-of mobile terminal Steal, and can provide perfect anti-theft feature carries out antitheft to mobile terminal, solves in prior art, and mobile terminal is stolen Afterwards, it is impossible to which continuation carries out antitheft problem to mobile terminal.The embodiment of the present invention is still able to after mobile terminal is stolen The antitheft instruction of sender is received, and antitheft operation is performed according to the antitheft order for parsing antitheft instruction acquisition.For example, user After mobile terminal is lost, instruct to stolen mobile terminal by transmission is antitheft, the embodiment of the present invention can be to stolen mobile whole End carries out screen locking operation, prevents stealer from using mobile terminal.Stealer cannot cause stealer lead to using mobile terminal The operation renovation mobile terminal such as brush machine is crossed, and then stolen mobile terminal cannot be resell and be earned a profit by stealer.Further, can The probability that stealing crime occurs is reduced effectively.In addition, according to the antitheft instruction for receiving, the embodiment of the present invention can also be obtained steathily The identification information of robber person(The such as photo of stealer, fingerprint etc.).The identity of stealer is got according to embodiments of the present invention After identification information, stealer can be arrested according to above-mentioned identification information.Therefore, the embodiment of the present invention can reach To terminal it is stolen after effectively terminal is carried out antitheft, and reduce stealing crime rate, the beneficial effect of protection user's property safety Really.
In description mentioned herein, a large amount of details are illustrated.It is to be appreciated, however, that the enforcement of the present invention Example can be put into practice in the case where not having these details.In some instances, known method, structure is not been shown in detail And technology, so as not to obscure the understanding of this description.
Similarly, it will be appreciated that in order to simplify the disclosure and help understand one or more in each inventive aspect, exist Above to, in the description of the exemplary embodiment of the present invention, each feature of the present invention is grouped together into single enforcement sometimes In example, figure or descriptions thereof.However, should the method for the disclosure be construed to reflect following intention:I.e. required guarantor The more features of feature is expressly recited in each claim by the application claims ratio of shield.More precisely, such as following Claims it is reflected as, inventive aspect is less than all features of single embodiment disclosed above.Therefore, Thus the claims for following specific embodiment are expressly incorporated in the specific embodiment, wherein each claim itself All as the separate embodiments of the present invention.
Those skilled in the art are appreciated that can be carried out adaptively to the module in the equipment in embodiment Change and they are arranged in one or more different from embodiment equipment.Can be the module or list in embodiment Unit or component are combined into a module or unit or component, and can be divided in addition multiple submodule or subelement or Sub-component.In addition at least some in such feature and/or process or unit is excluded each other, can adopt any Combination is to this specification(Including adjoint claim, summary and accompanying drawing)Disclosed in all features and so disclosed appoint Where all processes or unit of method or equipment are combined.Unless expressly stated otherwise, this specification(Including adjoint power Profit requires, makes a summary and accompanying drawing)Disclosed in each feature can be by providing identical, equivalent or the alternative features of similar purpose carry out generation Replace.
Although additionally, it will be appreciated by those of skill in the art that some embodiments described herein include other embodiments In some included features rather than further feature, but the combination of the feature of different embodiments means in of the invention Within the scope of and form different embodiments.For example, in detail in the claims, embodiment required for protection one of arbitrarily Can in any combination mode using.
The present invention all parts embodiment can be realized with hardware, or with one or more processor operation Software module realize, or with combinations thereof realize.It will be understood by those of skill in the art that can use in practice Microprocessor or digital signal processor(DSP)To realize in guarding against theft for mobile terminal equipment according to embodiments of the present invention The some or all functions of a little or whole parts.The present invention is also implemented as performing method as described herein Some or all equipment or program of device(For example, computer program and computer program).Such realization The program of the present invention can be stored on a computer-readable medium, or can have the form of one or more signal.This The signal of sample can be downloaded from internet website and be obtained, or provide on carrier signal, or be carried with any other form For.
It should be noted that above-described embodiment the present invention will be described rather than limits the invention, and ability Field technique personnel can design alternative embodiment without departing from the scope of the appended claims.In the claims, Any reference markss between bracket should not be configured to limitations on claims.Word "comprising" is not excluded the presence of not Element listed in the claims or step.Word "a" or "an" before element does not exclude the presence of multiple such Element.The present invention can come real by means of the hardware for including some different elements and by means of properly programmed computer It is existing.If in the unit claim for listing equipment for drying, several in these devices can be by same hardware branch To embody.The use of word first, second, and third does not indicate that any order.These words can be explained and be run after fame Claim.
So far, although those skilled in the art will appreciate that detailed herein illustrate and describe multiple showing for the present invention Example property embodiment, but, without departing from the spirit and scope of the present invention, still can be direct according to present disclosure It is determined that or deriving many other variations or modifications for meeting the principle of the invention.Therefore, the scope of the present invention is understood that and recognizes It is set to and covers all these other variations or modifications.
The embodiment of the invention also discloses A1, a kind of anti-theft method for mobile terminal, including:
Receive the antitheft instruction from PC PC terminal;
The antitheft instruction is parsed, the corresponding antitheft order of the instruction is obtained;
The corresponding operation of the antitheft order is performed, to realize guarding against theft for mobile terminal.
A2, the method according to A1, wherein, the antitheft instruction is parsed, the corresponding antitheft order of the instruction is obtained, is wrapped Include:
The antitheft instruction is parsed, the identity of this mobile terminal carried in obtaining the antitheft instruction;
The identity is verified;
If being verified, that triggers the antitheft order performs operation;
If checking does not pass through, stop response.
A3, the method according to A2, wherein, the identity of described mobile terminal includes:Described mobile terminal International Mobile Equipment Identity identification code IMEI.
A4, the method according to any one of A1 to A3, wherein, it is described to receive before the antitheft instruction of PC terminals, Including:
The activation file from the PC terminals is received, wherein, the activation file carries described mobile terminal Identity and anti-theft modes mark;
The activation file is verified according to the identity;
If being verified, the different anti-theft modes of activation are identified according to the anti-theft modes.
A5, the method according to A4, wherein, identified according to the anti-theft modes and determine different anti-theft modes, including:
If the anti-theft modes are designated PC anti-theft modes mark, start the antitheft strategies of PC;
If the anti-theft modes are designated account anti-theft modes mark, start the antitheft strategy of account.
A6, the method according to A4 or A5, wherein, the anti-theft modes mark includes at least one following:
The PC terminals are generated, and the one-to-one random string GUID of this mobile terminal;
Account identifier UID for identifying account generated after User logs in account, wherein, the User logs in of UID The entitled USERNAME of account;
Password PASSWORD.
A7, the method according to any one of A4 to A6, wherein, identified according to the anti-theft modes determine it is different antitheft Pattern, including:
If the anti-theft modes mark only includes the GUID, the antitheft strategies of PC are opened, the antitheft life is directly performed Make corresponding operation;
If the anti-theft modes mark includes the GUID and PASSWORD, the antitheft strategies of PC are opened, institute is verified PASSWROD is stated whether correct;If so, then perform the corresponding operation of the antitheft order;If it is not, then stopping response;
If the anti-theft modes mark includes the UID, the antitheft strategy of account is opened, is stepped in described mobile terminal The USERNAME is recorded, the antitheft order from the UID is received and is performed corresponding operation;
If the anti-theft modes mark includes the GUID and UID, open the antitheft strategies of PC and account is antitheft Strategy, receives the antitheft order from PC terminals or the UID and performs corresponding operation;
If anti-theft modes mark includes the GUID, the UID and the PASSWORD, open PC it is antitheft it is tactful with And the antitheft strategy of account, receiving the antitheft order from the PC terminals or the UID is carried out to the PASSWORD Checking;If being verified, the corresponding operation of antitheft order of reception is performed;If checking does not pass through, stop response.
A8, the method according to any one of A1 to A7, wherein, also include:
During any operation is performed, poll inquiry its whether run succeeded;
If so, then terminate the operation;
If it is not, then again attempting to perform the operation.
A9, the method according to any one of A1 to A8, wherein, after performing the corresponding operation of the antitheft order, also Including:
Return implementing result as receipt to the PC terminals, wherein, if the PC terminals are not within a specified time received The receipt, then initiate poll inquiry, inquiry whether receipt success;If so, then terminate receipt inquiry;If it is not, then asking again Receipt.
A10, the method according to any one of A1 to A9, wherein, the PC terminals and this mobile terminal by wired or Wireless mode connects and gets through, wherein, the wired mode includes general-purpose serial bus USB connecting line, the wireless mode bag Include wireless network.
The embodiment of the invention also discloses B11, a kind of guarding against theft for mobile terminal client, including:
Receiver module, is configured to receive the antitheft instruction from PC PC terminal;
Parsing module, is configured to the parsing antitheft instruction, obtains the corresponding antitheft order of the instruction;
Performing module, is configured to perform the corresponding operation of the antitheft order, to realize guarding against theft for mobile terminal.
B12, the client according to B11, wherein, the parsing module is additionally configured to:
The antitheft instruction is parsed, the identity of this mobile terminal carried in obtaining the antitheft instruction;
The identity is verified;
If being verified, that triggers the antitheft order performs operation;
If checking does not pass through, stop response.
B13, the client according to B12, wherein, the identity of described mobile terminal includes:Described movement The International Mobile Equipment Identity identification code IMEI of terminal.
B14, the client according to any one of B11 to B13, wherein, also include:Active module, is configured to:
The activation file from the PC terminals is received, wherein, the activation file carries described mobile terminal Identity and anti-theft modes mark;
The activation file is verified according to the identity;
If being verified, the different anti-theft modes of activation are identified according to the anti-theft modes.
B15, the client according to B14, wherein, the active module is additionally configured to:
If the anti-theft modes are designated PC anti-theft modes mark, start the antitheft strategies of PC;
If the anti-theft modes are designated account anti-theft modes mark, start the antitheft strategy of account.
B16, the client according to B14 or B15, wherein, the anti-theft modes mark includes at least one following:
The PC terminals are generated, and the one-to-one random string GUID of this mobile terminal;
Account identifier UID for identifying account generated after User logs in account, wherein, the User logs in of UID The entitled USERNAME of account;
Password PASSWORD.
B17, the client according to any one of B14 to B16, wherein, the active module is additionally configured to:
If the anti-theft modes mark only includes the GUID, the antitheft strategies of PC are opened, the antitheft life is directly performed Make corresponding operation;
If the anti-theft modes mark includes the GUID and PASSWORD, the antitheft strategies of PC are opened, institute is verified PASSWROD is stated whether correct;If so, then perform the corresponding operation of the antitheft order;If it is not, then stopping response;
If the anti-theft modes mark includes the UID, the antitheft strategy of account is opened, is stepped in described mobile terminal The USERNAME is recorded, the antitheft order from the UID is received and is performed corresponding operation;
If the anti-theft modes mark includes the GUID and UID, open the antitheft strategies of PC and account is antitheft Strategy, receives the antitheft order from PC terminals or the UID and performs corresponding operation;
If anti-theft modes mark includes the GUID, the UID and the PASSWORD, the PC that opens an account it is antitheft it is tactful with And the antitheft strategy of account, receiving the antitheft order from the PC terminals or the UID is carried out to the PASSWORD Checking;If being verified, the corresponding operation of antitheft order of reception is performed;If checking is not notified, stop response.
B18, the client according to any one of B11 to B17, wherein, also including poller module, it is configured to:
During any operation is performed, poll inquiry its whether run succeeded;
If so, then terminate the operation;
If it is not, then again attempting to perform the operation.
B19, the client according to any one of B11 to B18, wherein, also include:
Interface, is configured to pass wired or wireless way and connects the PC terminals and this mobile terminal, wherein, it is described wired Mode includes general-purpose serial bus USB connecting line, and the wireless mode includes wireless network.

Claims (17)

1. a kind of anti-theft method for mobile terminal, including:
Receive the antitheft instruction from PC PC terminal;
The antitheft instruction is parsed, the corresponding antitheft order of the instruction is obtained;
The corresponding operation of the antitheft order is performed, to realize guarding against theft for mobile terminal,
Wherein, it is described reception before the antitheft instruction of PC terminals, including:
The activation file from the PC terminals is received, wherein, the activation file carries the identity of this mobile terminal And anti-theft modes mark;
The activation file is verified according to the identity;
If being verified, the different anti-theft modes of activation are identified according to the anti-theft modes.
2. method according to claim 1, wherein, the antitheft instruction is parsed, the corresponding antitheft order of the instruction is obtained, Including:
The antitheft instruction is parsed, the identity of this mobile terminal carried in obtaining the antitheft instruction;
The identity is verified;
If being verified, that triggers the antitheft order performs operation;
If checking does not pass through, stop response.
3. method according to claim 2, wherein, the identity of described mobile terminal includes:Described mobile whole The International Mobile Equipment Identity identification code IMEI at end.
4. method according to claim 1, wherein, identified according to the anti-theft modes and determine different anti-theft modes, bag Include:
If the anti-theft modes are designated PC anti-theft modes mark, start the antitheft strategies of PC;
If the anti-theft modes are designated account anti-theft modes mark, start the antitheft strategy of account.
5. the method according to claim 1 or 4, wherein, the anti-theft modes mark includes at least one following:
The PC terminals are generated, and the one-to-one random string GUID of this mobile terminal;
Account identifier UID for identifying account generated after User logs in account, wherein, the account of the User logs in of UID Entitled USERNAME;
Password PASSWORD.
6. method according to claim 5, wherein, identified according to the anti-theft modes and determine different anti-theft modes, bag Include:
If the anti-theft modes mark only includes the GUID, the antitheft strategies of PC are opened, directly perform the antitheft order right The operation answered;
If the anti-theft modes mark includes the GUID and PASSWORD, the antitheft strategies of PC are opened, checking is described Whether PASSWROD is correct;If so, then perform the corresponding operation of the antitheft order;If it is not, then stopping response;
If the anti-theft modes mark includes the UID, the antitheft strategy of account is opened, institute is logged in described mobile terminal USERNAME is stated, the antitheft order from the UID is received and is performed corresponding operation;
If the anti-theft modes mark includes the GUID and UID, the antitheft strategies of PC and the antitheft strategy of account are opened, Receive the antitheft order from PC terminals or the UID and perform corresponding operation;
If the anti-theft modes mark includes the GUID, the UID and the PASSWORD, the antitheft strategies of PC and account are opened Number antitheft strategy, receives the antitheft order from the PC terminals or the UID and the PASSWORD is verified; If being verified, the corresponding operation of antitheft order of reception is performed;If checking does not pass through, stop response.
7. the method according to any one of Claims 1-4, wherein, also include:
During any operation is performed, poll inquiry its whether run succeeded;
If so, then terminate the operation;
If it is not, then again attempting to perform the operation.
8. the method according to any one of Claims 1-4, wherein, after performing the corresponding operation of the antitheft order, also Including:
Return implementing result as receipt to the PC terminals, wherein, if the PC terminals within a specified time do not receive it is described Receipt, then initiate poll inquiry, inquiry whether receipt success;If so, then terminate receipt inquiry;If it is not, then asking receipt again.
9. the method according to any one of Claims 1-4, wherein, the PC terminals and this mobile terminal by wired or Wireless mode connects and gets through, wherein, the wired mode includes general-purpose serial bus USB connecting line, the wireless mode bag Include wireless network.
10. a kind of guarding against theft for mobile terminal client, including:
Receiver module, is configured to receive the antitheft instruction from PC PC terminal;
Parsing module, is configured to the parsing antitheft instruction, obtains the corresponding antitheft order of the instruction;
Performing module, is configured to perform the corresponding operation of the antitheft order, to realize guarding against theft for mobile terminal,
The guarding against theft for mobile terminal client also includes:Active module, is configured to:
The activation file from the PC terminals is received, wherein, the activation file carries the identity of this mobile terminal And anti-theft modes mark;
The activation file is verified according to the identity;
If being verified, the different anti-theft modes of activation are identified according to the anti-theft modes.
11. clients according to claim 10, wherein, the parsing module is additionally configured to:
The antitheft instruction is parsed, the identity of this mobile terminal carried in obtaining the antitheft instruction;
The identity is verified;
If being verified, that triggers the antitheft order performs operation;
If checking does not pass through, stop response.
12. clients according to claim 11, wherein, the identity of described mobile terminal includes:Described shifting The International Mobile Equipment Identity identification code IMEI of dynamic terminal.
13. clients according to claim 10, wherein, the active module is additionally configured to:
If the anti-theft modes are designated PC anti-theft modes mark, start the antitheft strategies of PC;
If the anti-theft modes are designated account anti-theft modes mark, start the antitheft strategy of account.
14. clients according to claim 10 or 13, wherein, the anti-theft modes mark includes at least one following:
The PC terminals are generated, and the one-to-one random string GUID of this mobile terminal;
Account identifier UID for identifying account generated after User logs in account, wherein, the account of the User logs in of UID Entitled USERNAME;
Password PASSWORD.
15. clients according to claim 14, wherein, the active module is additionally configured to:
If the anti-theft modes mark only includes the GUID, the antitheft strategies of PC are opened, directly perform the antitheft order right The operation answered;
If the anti-theft modes mark includes the GUID and PASSWORD, the antitheft strategies of PC are opened, checking is described Whether PASSWROD is correct;If so, then perform the corresponding operation of the antitheft order;If it is not, then stopping response;
If the anti-theft modes mark includes the UID, the antitheft strategy of account is opened, institute is logged in described mobile terminal USERNAME is stated, the antitheft order from the UID is received and is performed corresponding operation;
If the anti-theft modes mark includes the GUID and UID, the antitheft strategies of PC and the antitheft strategy of account are opened, Receive the antitheft order from PC terminals or the UID and perform corresponding operation;
If the anti-theft modes mark includes the GUID, the UID and the PASSWORD, the antitheft strategies of the PC that opens an account and account Number antitheft strategy, receives the antitheft order from the PC terminals or the UID and the PASSWORD is verified; If being verified, the corresponding operation of antitheft order of reception is performed;If checking is not notified, stop response.
16. clients according to any one of claim 10 to 13, wherein, also including poller module, it is configured to:
During any operation is performed, poll inquiry its whether run succeeded;
If so, then terminate the operation;
If it is not, then again attempting to perform the operation.
17. clients according to any one of claim 10 to 13, wherein, also include:
Interface, is configured to pass wired or wireless way and connects the PC terminals and this mobile terminal, wherein, the wired mode Including general-purpose serial bus USB connecting line, the wireless mode includes wireless network.
CN201310686970.7A 2013-12-13 2013-12-13 Anti-theft method for mobile terminal and client Active CN103716791B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201310686970.7A CN103716791B (en) 2013-12-13 2013-12-13 Anti-theft method for mobile terminal and client
PCT/CN2014/093636 WO2015085940A1 (en) 2013-12-13 2014-12-11 Mobile terminal antitheft method and client

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310686970.7A CN103716791B (en) 2013-12-13 2013-12-13 Anti-theft method for mobile terminal and client

Publications (2)

Publication Number Publication Date
CN103716791A CN103716791A (en) 2014-04-09
CN103716791B true CN103716791B (en) 2017-04-05

Family

ID=50409262

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310686970.7A Active CN103716791B (en) 2013-12-13 2013-12-13 Anti-theft method for mobile terminal and client

Country Status (1)

Country Link
CN (1) CN103716791B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015085940A1 (en) * 2013-12-13 2015-06-18 北京奇虎科技有限公司 Mobile terminal antitheft method and client

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101222692A (en) * 2007-01-09 2008-07-16 中兴通讯股份有限公司 Terminal anti-theft method based on terminal management service
CN101393589A (en) * 2008-07-25 2009-03-25 深圳市创智成科技有限公司 Notebook computer, mobile communication anti-theft device and anti-theft method thereof
CN102164361A (en) * 2011-03-29 2011-08-24 福建鑫诺通讯技术有限公司 Anti-theft method for mobile terminal
CN102231740A (en) * 2011-06-24 2011-11-02 中兴通讯股份有限公司 Antitheft platform, client, terminal and antitheft processing method for mobile terminal
CN103392328A (en) * 2012-12-21 2013-11-13 华为技术有限公司 Communication terminal work remote control server and method and communication terminal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101222692A (en) * 2007-01-09 2008-07-16 中兴通讯股份有限公司 Terminal anti-theft method based on terminal management service
CN101393589A (en) * 2008-07-25 2009-03-25 深圳市创智成科技有限公司 Notebook computer, mobile communication anti-theft device and anti-theft method thereof
CN102164361A (en) * 2011-03-29 2011-08-24 福建鑫诺通讯技术有限公司 Anti-theft method for mobile terminal
CN102231740A (en) * 2011-06-24 2011-11-02 中兴通讯股份有限公司 Antitheft platform, client, terminal and antitheft processing method for mobile terminal
CN103392328A (en) * 2012-12-21 2013-11-13 华为技术有限公司 Communication terminal work remote control server and method and communication terminal

Also Published As

Publication number Publication date
CN103716791A (en) 2014-04-09

Similar Documents

Publication Publication Date Title
CN104601324B (en) A kind of verification method, terminal and system for application
CN103702317B (en) Anti-theft method for mobile terminal and client
US10231124B2 (en) Anti-theft method and client for a mobile terminal
CN109525604A (en) A kind of method and relevant device of account binding
CN107426202B (en) Method for automatically testing WAF (Wireless Access Filter) interception rule
CN103702318A (en) Mobile terminal antitheft method and client
CN103634935B (en) WPS (Wi-Fi protected setup) or QSS (quick secure setup)-based network accessing method and device
CN110727938B (en) Configuration method and device of intelligent equipment, electronic equipment and storage medium
CN107426243A (en) A kind of network safety protection method and device
CN104751105A (en) Fingerprint data verification method, fingerprint data verification device, related equipment and system
CN108924137A (en) Method for secret protection and system under a kind of environment of internet of things
CN105163312B (en) Wireless network access method and Wireless network connection equipment
CN106507300A (en) A kind of method for giving loss terminal for change, device and terminal
CN103716791B (en) Anti-theft method for mobile terminal and client
CN103379478B (en) Control method, control system, client terminal and server
CN103501334B (en) Data transmission method, equipment and network system
CN109639434A (en) A kind of method for unlocking based on block chain, device, system and calculate equipment
CN106331169A (en) Method for reporting loss of mobile terminal and cloud customer terminal, cloud server, mobile terminal
CN104348804A (en) Offline automatic service locking method, apparatus and system
CN109150852A (en) A kind of account number safe login method, apparatus and system
CN109005193A (en) Alarming method for power, device and electric terminal
CN103702314B (en) The processing method of stolen terminal and equipment
CN108494749A (en) Method, apparatus, equipment and the computer readable storage medium of IP address disabling
CN107145342A (en) The treating method and apparatus of the channel information of application
CN106911653A (en) A kind of method for realizing mobile terminal remote control, device, mobile terminal and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20220729

Address after: Room 801, 8th floor, No. 104, floors 1-19, building 2, yard 6, Jiuxianqiao Road, Chaoyang District, Beijing 100015

Patentee after: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Address before: 100088 room 112, block D, 28 new street, new street, Xicheng District, Beijing (Desheng Park)

Patentee before: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Patentee before: Qizhi software (Beijing) Co.,Ltd.

TR01 Transfer of patent right