CN103716791B - Anti-theft method for mobile terminal and client - Google Patents
Anti-theft method for mobile terminal and client Download PDFInfo
- Publication number
- CN103716791B CN103716791B CN201310686970.7A CN201310686970A CN103716791B CN 103716791 B CN103716791 B CN 103716791B CN 201310686970 A CN201310686970 A CN 201310686970A CN 103716791 B CN103716791 B CN 103716791B
- Authority
- CN
- China
- Prior art keywords
- antitheft
- mobile terminal
- theft modes
- theft
- account
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Abstract
The invention provides a kind of anti-theft method for mobile terminal and client.Wherein, the method includes:Receive the antitheft instruction from PC PC terminal;Antitheft instruction is parsed, the corresponding antitheft order of the instruction is obtained;The corresponding operation of antitheft order is performed, to realize guarding against theft for mobile terminal.The embodiment of the present invention can reach non-opening anti-theft function mobile terminal it is stolen after antitheft operation is effectively carried out to the mobile terminal, and reduce stealing crime rate, the beneficial effect of protection user's property safety.
Description
Technical field
The present invention relates to internet, applications field, more particularly to a kind of anti-theft method for mobile terminal and client.
Background technology
With developing rapidly for intelligent mobile terminal and network, mobile terminal(Including plurality of devices such as mobile phone, flat boards)
In people's life, role is also more and more important, indispensable comprehensive in increasingly becoming people's work and living
" assistant ".For convenience of using, various account informations, private chat would generally be recorded by people in the application using mobile terminal
And the information such as picture photo is stored directly in mobile terminal.Therefore, if mobile terminal is lost, not only property can be brought to user
Loss, what is more important user are stored in the financial information such as the personal information in mobile terminal, such as account number cipher.These are private
If people's information is compromised, the loss that user causes is difficult to estimate.Therefore, mobile terminal is antitheft particularly significant.
In prior art, after mobile terminal is stolen, mobile terminal can continue to use in stealer side.Steal
Person prevents the owner of lost property from giving stolen mobile terminal for change by carrying out brush machine to mobile terminal or extracting the operation such as battery of mobile terminal, and
The owner of lost property cannot be protected to mobile terminal after terminal is stolen.When stealer is traded to stolen terminal, the owner of lost property cannot
Give stolen terminal for change, cause property loss, also, the subscriber datas such as the data in mobile terminal are stored in mobile terminal
Lose and lose and even cause more incalculable damages.
To sum up, after in prior art, mobile terminal is stolen, it is impossible to which it is indirect that continuation carries out antitheft defect to mobile terminal
Encourage the pilferage behavior of stealer, it is impossible to the ill effect such as effectively containment pilferage crime, and cause the user property loss.
The content of the invention
In view of the above problems, it is proposed that the present invention so as to provide one kind overcome the problems referred to above or at least in part solve on
State the anti-theft method for mobile terminal and corresponding client of problem.
According to one aspect of the present invention, there is provided a kind of anti-theft method for mobile terminal, including:Receive from PC
The antitheft instruction of PC terminals;The antitheft instruction is parsed, the corresponding antitheft order of the instruction is obtained;Perform the antitheft order right
The operation answered, to realize guarding against theft for mobile terminal.
Alternatively, the antitheft instruction is parsed, obtains the corresponding antitheft order of the instruction, including:Parse the antitheft finger
Order, the identity of this mobile terminal carried in obtaining the antitheft instruction;The identity is verified;If checking
Pass through, then that triggers the antitheft order performs operation;If checking does not pass through, stop response.
Alternatively, the identity of described mobile terminal includes:The International Mobile Equipment Identity of described mobile terminal
Identification code IMEI.
Alternatively, it is described reception before the antitheft instruction of PC terminals, including:Receive the activation from the PC terminals
File, wherein, the activation file carries the identity of described mobile terminal and anti-theft modes mark;According to described
Identity is verified to the activation file;If being verified, activation is identified according to the anti-theft modes different antitheft
Pattern.
Alternatively, identified according to the anti-theft modes and determine different anti-theft modes, including:If the anti-theft modes mark
Identify for PC anti-theft modes, then start the antitheft strategies of PC;If the anti-theft modes are designated account anti-theft modes mark, start
The antitheft strategy of account.
Alternatively, the anti-theft modes mark includes at least one following:The PC terminals are generated, and this mobile terminal
One-to-one random string GUID;Account identifier UID for identifying account generated after User logs in account, its
In, the entitled USERNAME of account of the User logs in of UID;Password PASSWORD.
Alternatively, identified according to the anti-theft modes and determine different anti-theft modes, including:If the anti-theft modes mark
When only including the GUID, the antitheft strategies of PC are opened, directly perform the corresponding operation of the antitheft order;If the anti-theft modes
When mark includes the GUID and PASSWORD, the antitheft strategies of PC are opened, verify whether the PASSWROD is correct;If
It is then to perform the corresponding operation of the antitheft order;If it is not, then stopping response;If the anti-theft modes mark includes the UID
When, the antitheft strategy of account is opened, the USERNAME is logged in described mobile terminal, received from the antitheft of the UID
Order and perform corresponding operation;If the anti-theft modes mark includes the GUID and UID, the antitheft strategies of PC are opened
And the antitheft strategy of account, receive the antitheft order from PC terminals or the UID and perform corresponding operation;If described anti-
Stealing pattern identification includes the GUID, the UID and the PASSWORD, opens the antitheft strategies of PC and the antitheft strategy of account,
Receive the antitheft order from the PC terminals or the UID to verify the PASSWORD;If being verified,
The corresponding operation of antitheft order of reception is performed then;If checking does not pass through, stop response.
Alternatively, the anti-theft method for mobile terminal also includes:During any operation is performed, poll inquiry its
Whether run succeeded;If so, then terminate the operation;If it is not, then again attempting to perform the operation.
Alternatively, after performing the corresponding operation of the antitheft order, also include:Return implementing result as receipt to institute
PC terminals are stated, wherein, if the PC terminals within a specified time do not receive the receipt, poll inquiry is initiated, whether inquiry
Receipt success;If so, then terminate receipt inquiry;If it is not, then asking receipt again.
Alternatively, the PC terminals are connected by wired or wireless way with this mobile terminal and are got through, wherein, it is described to have
Line mode includes general-purpose serial bus USB connecting line, and the wireless mode includes wireless network.
According to another aspect of the present invention, a kind of guarding against theft for mobile terminal client is additionally provided, including:Receiver module,
It is configured to receive the antitheft instruction from PC PC terminal;Parsing module, is configured to the parsing antitheft instruction, is somebody's turn to do
Instruct corresponding antitheft order;Performing module, is configured to perform the corresponding operation of the antitheft order, to realize that mobile terminal is prevented
Steal.
Alternatively, the parsing module is additionally configured to:The antitheft instruction is parsed, is carried in obtaining the antitheft instruction
The identity of this mobile terminal;The identity is verified;If being verified, holding for the antitheft order is triggered
Row operation;If checking does not pass through, stop response.
Alternatively, the identity of described mobile terminal includes:The International Mobile Equipment Identity of described mobile terminal
Identification code IMEI.
Alternatively, the guarding against theft for mobile terminal client also includes:Active module, is configured to:Receive from the PC ends
The activation file at end, wherein, the activation file carries the identity of described mobile terminal and anti-theft modes mark;
The activation file is verified according to the identity;If being verified, according to the activation of anti-theft modes mark not
Same anti-theft modes.
Alternatively, the active module is additionally configured to:If the anti-theft modes are designated PC anti-theft modes mark, start
The antitheft strategies of PC;If the anti-theft modes are designated account anti-theft modes mark, start the antitheft strategy of account.
Alternatively, the anti-theft modes mark includes at least one following:The PC terminals are generated, and this mobile terminal
One-to-one random string GUID;Account identifier UID for identifying account generated after User logs in account, its
In, the entitled USERNAME of account of the User logs in of UID;Password PASSWORD.
Alternatively, the active module is additionally configured to:If the anti-theft modes mark only includes the GUID, PC is opened
Antitheft strategy, directly performs the corresponding operation of the antitheft order;If anti-theft modes mark includes the GUID and described
During PASSWORD, the antitheft strategies of PC are opened, verify whether the PASSWROD is correct;If so, then perform the antitheft order right
The operation answered;If it is not, then stopping response;If the anti-theft modes mark includes the UID, the antitheft strategy of account is opened,
The USERNAME is logged in described mobile terminal, the antitheft order from the UID is received and is performed corresponding operation;If
When the anti-theft modes mark includes the GUID and UID, the antitheft strategies of PC and the antitheft strategy of account are opened, is received and
From the antitheft order of PC terminals or the UID and perform corresponding operation;If anti-theft modes mark include the GUID,
The antitheft strategy of the UID and PASSWORD, the PC that opens an account and the antitheft strategy of account, receive from the PC terminals or
The antitheft order of the UID is verified to the PASSWORD;If being verified, the antitheft order correspondence of reception is performed
Operation;If checking is not notified, stop response.
Alternatively, also including poller module, it is configured to:During any operation is performed, poll inquiry its whether
Run succeeded;If so, then terminate the operation;If it is not, then again attempting to perform the operation.
Alternatively, the guarding against theft for mobile terminal client also includes:Interface, is configured to pass wired or wireless way connection
The PC terminals and this mobile terminal, wherein, the wired mode includes general-purpose serial bus USB connecting line, the wireless parties
Formula includes wireless network.
In embodiments of the present invention, the antitheft instruction from PC terminals is received, and antitheft life is obtained by parsing antitheft instruction
Order, and according to antitheft order, it is able to carry out corresponding antitheft operation.As can be seen here, the antitheft instruction in the embodiment of the present invention
From PC terminals can be used, on the premise of the non-opening anti-theft function of stolen mobile terminal, open and using mobile terminal
Anti-theft feature.Antitheft instruction is sent using PC terminals, it is simple to operate such that it is able to conveniently and efficiently to realize the anti-of mobile terminal
Steal, and can provide perfect anti-theft feature carries out antitheft to mobile terminal, solves in prior art, and mobile terminal is stolen
Afterwards, it is impossible to which continuation carries out antitheft problem to mobile terminal.The embodiment of the present invention is still able to after mobile terminal is stolen
The antitheft instruction of sender is received, and antitheft operation is performed according to the antitheft order for parsing antitheft instruction acquisition.For example, user
After mobile terminal is lost, instruct to stolen mobile terminal by transmission is antitheft, the embodiment of the present invention can be to stolen mobile whole
End carries out screen locking operation, prevents stealer from using mobile terminal.Stealer cannot cause stealer lead to using mobile terminal
The operation renovation mobile terminal such as brush machine is crossed, and then stolen mobile terminal cannot be resell and be earned a profit by stealer.Further, can
The probability that stealing crime occurs is reduced effectively.In addition, according to the antitheft instruction for receiving, the embodiment of the present invention can also be obtained steathily
The identification information of robber person(The such as photo of stealer, fingerprint etc.).The identity of stealer is got according to embodiments of the present invention
After identification information, stealer can be arrested according to above-mentioned identification information.Therefore, the embodiment of the present invention can reach
To terminal it is stolen after effectively terminal is carried out antitheft, and reduce stealing crime rate, the beneficial effect of protection user's property safety
Really.
Described above is only the general introduction of technical solution of the present invention, in order to better understand the technological means of the present invention,
And can be practiced according to the content of description, and in order to allow the above and other objects of the present invention, feature and advantage can
Become apparent, below especially exemplified by the specific embodiment of the present invention.
According to the detailed description below in conjunction with accompanying drawing to the specific embodiment of the invention, those skilled in the art will be brighter
The above-mentioned and other purposes of the present invention, advantages and features.
Description of the drawings
By the detailed description for reading hereafter preferred implementation, various other advantages and benefit are common for this area
Technical staff will be clear from understanding.Accompanying drawing is only used for the purpose for illustrating preferred implementation, and is not considered as to the present invention
Restriction.And in whole accompanying drawing, it is denoted by the same reference numerals identical part.In the accompanying drawings:
Fig. 1 shows the process chart of anti-theft method for mobile terminal according to an embodiment of the invention;
Fig. 2 shows the place of the method for the anti-theft feature that Activates Phone of PC terminals side according to an embodiment of the invention
Reason flow chart;
Fig. 3 shows the process chart of the theft preventing method according to one embodiment of the invention mobile phone side;And
Fig. 4 shows the structural representation of guarding against theft for mobile terminal client according to an embodiment of the invention.
Specific embodiment
The exemplary embodiment of the disclosure is more fully described below with reference to accompanying drawings.Although the disclosure is shown in accompanying drawing
Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure and should not be by embodiments set forth here
Limited.On the contrary, there is provided these embodiments are able to be best understood from the disclosure, and can be by the scope of the present disclosure
Complete conveys to those skilled in the art.
Refer in correlation technique, after mobile terminal is stolen, it is impossible to which it is indirect that continuation carries out antitheft defect to mobile terminal
Encourage the pilferage behavior of stealer, it is impossible to the ill effect such as effectively containment pilferage crime, and cause the user property loss.
To solve above-mentioned technical problem, a kind of anti-theft method for mobile terminal is embodiments provided.Fig. 1 shows root
According to the process chart of the anti-theft method for mobile terminal of one embodiment of the invention.Referring to Fig. 1, the flow process at least includes step
S102 is to step S106.
Step S102, reception are from PC(Personal Computer, hereinafter referred to as PC)The antitheft finger of terminal
Order.
Step S104, the antitheft instruction of parsing, obtain the corresponding antitheft order of the instruction.
Step S106, the corresponding operation of the antitheft order of execution, to realize guarding against theft for mobile terminal.
In embodiments of the present invention, the antitheft instruction from PC terminals is received, and antitheft life is obtained by parsing antitheft instruction
Order, and according to antitheft order, it is able to carry out corresponding antitheft operation.As can be seen here, the antitheft instruction in the embodiment of the present invention
From PC terminals can be used, on the premise of the non-opening anti-theft function of stolen mobile terminal, open and using mobile terminal
Anti-theft feature.Antitheft instruction is sent using PC terminals, it is simple to operate such that it is able to conveniently and efficiently to realize the anti-of mobile terminal
Steal, and can provide perfect anti-theft feature carries out antitheft to mobile terminal, solves in prior art, and mobile terminal is stolen
Afterwards, it is impossible to which continuation carries out antitheft problem to mobile terminal.The embodiment of the present invention is still able to after mobile terminal is stolen
The antitheft instruction of sender is received, and antitheft operation is performed according to the antitheft order for parsing antitheft instruction acquisition.For example, user
After mobile terminal is lost, instruct to stolen mobile terminal by transmission is antitheft, the embodiment of the present invention can be to stolen mobile whole
End carries out screen locking operation, prevents stealer from using mobile terminal.Stealer cannot cause stealer lead to using mobile terminal
The operation renovation mobile terminal such as brush machine is crossed, and then stolen mobile terminal cannot be resell and be earned a profit by stealer.Further, can
The probability that stealing crime occurs is reduced effectively.In addition, according to the antitheft instruction for receiving, the embodiment of the present invention can also be obtained steathily
The identification information of robber person(The such as photo of stealer, fingerprint etc.).The identity of stealer is got according to embodiments of the present invention
After identification information, stealer can be arrested according to above-mentioned identification information.Therefore, the embodiment of the present invention can reach
To terminal it is stolen after effectively terminal is carried out antitheft, and reduce stealing crime rate, the beneficial effect of protection user's property safety
Really.
Before step S102 as shown in Figure 1 is performed, i.e. received before the antitheft instruction of PC terminals, receive and
From PC terminals, the identity that carries this mobile terminal and anti-theft modes mark activation file.Preferably, the present invention
Activation file in embodiment is by expandable mark language XML or the data interchange format of lightweight(JavaScript
Object Notation, hereinafter referred to as JSON)Composition, for the activation manipulation between PC terminals and mobile terminal.Receive activation
After file, the embodiment of the present invention is tested to activating file according to the identity of the mobile terminal carried in activation file
Card.If the identity of the mobile terminal carried in activation file is the identity of this mobile terminal, activation file passes through
Checking.If the identity of the mobile terminal carried in activation file is not the identity of this mobile terminal, file is activated
It is not verified.In view of PC terminals in addition to the attribute for possessing equipment, the characteristics such as online are also equipped with, therefore, PC terminals are suitable for model
Enclose relatively wide, different anti-theft modes can be triggered.After activation file is by checking, the embodiment of the present invention can be according to activation
The anti-theft modes mark that file is carried confirms this anti-theft modes for being adopted in different anti-theft modes.
Because anti-theft modes have multiformity, anti-theft modes mark also accordingly exists various.Conversely speaking, can be according to different preventing
The different information that pattern identification includes are stolen, different anti-theft modes are distinguished.Different anti-theft modes are provided in the embodiment of the present invention
The illustration of mark, specifically, can include:
Only include by PC generate, and the one-to-one random string GUID of this mobile terminal first group of anti-theft modes
Mark, including GUID and password(PASSWORD)Second group of anti-theft modes mark, only include account identifier(UID)The 3rd
Group anti-theft modes mark, the 4th group of anti-theft modes including GUID and UID are identified and while including GUID, UID, PASSWORD
The 5th group of anti-theft modes mark of three.
Now different to five groups anti-theft modes marks and its effect are illustrated respectively.
When anti-theft modes are designated first group of anti-theft modes mark only including GUID, the antitheft strategies of PC, and root are opened
Corresponding antitheft operation is performed directly according to the antitheft order for receiving.Wherein, GUID is the random string that PC is generated, and should
Character string can set up one-to-one binding relationship with mobile terminal.
When anti-theft modes are designated second group of anti-theft modes mark including GUID and PASSWORD, the antitheft plans of PC are opened
Slightly, and whether PASSWORD is correctly verified.If so, then perform the corresponding antitheft operation of the antitheft order for receiving.If
It is no, then stop response, do not perform any operation.Wherein, the password that the PASSWORD is pre-set for user, when the password value not
For space-time, the embodiment of the present invention is verified to the PASSWORD before antitheft order is performed.
When anti-theft modes are designated the 3rd group of anti-theft modes mark only including UID, the antitheft strategy of account is opened.Its
In, UID is the account identifier for identifying account that generates after the account of the entitled USERSNAME of User logs in account.
When anti-theft modes are designated the 4th group of anti-theft modes mark including UID and GUID, the antitheft strategies of PC are opened
And the antitheft strategy of account, receive the antitheft instruction from PC terminals or UID and perform corresponding antitheft operation.
When anti-theft modes are designated while when identifying including the 5th group of anti-theft modes of GUID, UID, PASSWORD three,
Open the antitheft strategies of PC and the antitheft strategy of account.Also, receive from being required to during the antitheft order of PC terminals or UID
First PASSWORD is verified.Secondly, whether next step operation is carried out by checking according to PASSWORD.Specifically, when
By when, the embodiment of the present invention performs the corresponding antitheft operation of antitheft order that receives, when obstructed out-of-date, the embodiment of the present invention
Stop response, do not perform any operation.
As described above, the difference for activating the anti-theft modes mark carried in file for being sent according to PC terminals, the present invention
Embodiment can activate different anti-theft modes.That is, when antitheft operation is carried out by PC terminal-pairs mobile terminal, by PC ends
End can be triggered a kind of antitheft strategy and be sent antitheft order to mobile terminal, can also trigger various antitheft strategies while to movement
Terminal sends antitheft order.For example, when the anti-theft modes in file is activated are designated,
The embodiment of the present invention can only carry out the antitheft strategy of account respectively or only carry out the antitheft strategies of PC.When antitheft in activation file
Pattern identification for simultaneously including UID and GUID when, the embodiment of the present invention can carry out that PC is antitheft and account is antitheft simultaneously, increase
The strong anti-theft protection to mobile terminal, increase give the probability of mobile terminal for change.In the embodiment of the present invention, PC is antitheft including passing through
PC terminals send it is antitheft instruct to mobile terminal mobile terminal is carried out it is antitheft, also including activation account account is carried out to mobile terminal
It is number antitheft.When PC terminals activation account mobile terminal is carried out account it is antitheft when, PC terminals only account information is sent to as
In the mobile terminal of login side.
In the embodiment of the present invention, the difference of the antitheft strategies of PC strategy antitheft with account has:In the antitheft strategies of PC
ACTIONID needs to distinguish with the ACTIONID in account anti-theft strategy." positioning " for example in account anti-theft strategy,
ACTIONID is LOCATE, and plants in the antitheft strategies of PC and should be " LOCATE_PC ", but the operation for performing is identical.UID is in PC
It is GUID in antitheft strategy.That is, the information of the unique account in labelling account anti-theft is UID, and unique during labelling PC is antitheft
The information of computer be GUID.If anti-theft modes are designated the side identified including the anti-theft modes of GUID and PASSWORD
Formula, namely send order and need password, then in the OTHERS of each order, add PASSWORD parts(The field can be attached to
It is last).Such as " removing data in mobile phone "<OTHERS>In can be " 3, PASSWORD:123123123 ", wherein " 3 " represent
Data in mobile phone type to be removed, and " PASSWORD:" below be exactly password.Stolen side is after order is received, if passed through
When PC is activated, existing password, then, in the order sent, should also take out<OTHERS>Part, takes out " PASSWORD:" below close
Code is contrasted.If identical, then it represents that order is correct, user cipher input error be otherwise likely to be, or order is
It is tampered.
In addition, in the embodiment of the present invention, personal settings can be carried out to PASSWORD.If user arranges PASSWORD,
Before antitheft operation is performed, the PASSWORD is verified, malicious peer can be avoided to send antitheft instruction causes movement
End-error performs antitheft operation(Such as malice screen locking, reveal real-time position information etc.)Cause severe consequence.User can also
The setting of PASSWORD is not carried out as needed, terminal anti-theft is moved by PC or account directly, it is to avoid complex steps.No
PASSWORD checkings are needed to be generally used for network environment trusty or conventional trusted terminal, such as family computer, office's electricity
The equipment such as brain.
In the embodiment of the present invention, according to the corresponding antitheft mould of anti-theft modes mark activation in the activation file by checking
After formula, step S102 as shown in Figure 1 is performed, receive the antitheft instruction from PC terminals.After receiving, execution step
S104, the antitheft instruction to receiving are parsed, the identity of this mobile terminal carried in obtaining antitheft instruction.Obtain
After the identity of this mobile terminal carried in antitheft instruction, the embodiment of the present invention is verified to identity.If testing
Card passes through, then perform step S106 as shown in Figure 1, performs the corresponding operation of antitheft order, to realize guarding against theft for mobile terminal.If
Checking does not pass through, then the embodiment of the present invention stops response, does not perform any operation.
In the embodiment of the present invention, it is arbitrary it is antitheft order be performed during, poll inquiry this it is antitheft order whether hold
Go successfully, if so, then terminate the execution of the antitheft order, if it is not, then again attempting to perform the antitheft order.The embodiment of the present invention
In, the implementation status of antitheft order is polled inquiry ensure acquisition for mobile terminal to antitheft order can be held in time
OK, it is to avoid order execution to cause stealer that brush machine or other operations are carried out to mobile terminal so that mobile whole not in time because antitheft
End cannot be retrieved.For example, the embodiment of the present invention will perform lock-screen order, and whether the lock-screen order is performed into
Work(is inquired about.If lock-screen order is not carried out, the embodiment of the present invention performs lock-screen order, the screen to mobile terminal
Curtain is locked.If lock-screen order runs succeeded, the embodiment of the present invention is abandoned performing the screen locking order again.
In the embodiment of the present invention, the identity of mobile terminal can be user identification module(Subscriber
Identity Module, hereinafter referred to as SIM)Card number, can be that hardware configuration information of mobile terminal etc. arbitrarily uniquely can be marked
Know the identification information of mobile terminal.Preferably, the embodiment of the present invention is known using the International Mobile Equipment Identity of mobile terminal
Other code(International Mobile Equipment Identity, hereinafter referred to as IMEI)As this mobile terminal
Identity, IMEI itself and mobile terminal are lifelong bindings and unique constant, and recognizability is high, therefore, this
In inventive embodiments, preferred IMEI is the unique identity of this mobile terminal.
In addition, in the embodiment of the present invention, PC terminals can be connected by wired or wireless mode with this mobile terminal beats
It is logical.For example, PC terminals can pass through USB (universal serial bus) with this mobile terminal(Universal Serial Bus, hereinafter referred to as
USB)Data wire is attached.Again for example, PC terminals can be entered by wireless modes such as bluetooth, wireless networks with this mobile terminal
Row connection.In the embodiment of the present invention, PC terminals can be attached and be beaten by wired or wireless mode with this mobile terminal
It is logical, facilitate PC terminals and mobile terminal in several ways or means are attached and get through, and then PC ends can be passed through
End carries out antitheft to mobile terminal, and the safety of mobile terminal is effectively ensured.
Now the anti-theft method for mobile terminal of the present invention is illustrated with specific embodiment.
Embodiment one
Fig. 2 and Fig. 3 show the process chart of anti-theft method for mobile terminal in accordance with a preferred embodiment of the present invention,
For supporting above-mentioned any one anti-theft method for mobile terminal, above-mentioned anti-theft method for mobile terminal is illustrated and must be become apparent from easily
Understand.It should be noted that being to illustrate simpler clear by this preferred embodiment, mobile terminal is set in this preferred embodiment
It is set to mobile phone.
Fig. 2 shows the place of the method for the anti-theft feature that Activates Phone of PC terminals side according to an embodiment of the invention
Reason flow chart.Referring to Fig. 2, the flow process at least includes step S202 to step S216.
Step S202, judge PC terminals are connected with whether mobile phone is set up.If so, execution step S204, if it is not, flow process knot
Beam.
Step S204, the identity IMEI for obtaining mobile phone.
Step S206, judge whether User logs in account activates.If it is not, execution step S208, if so, execution step
S210。
Step S208, to server send PC binding(Bind_By_PC)Instruction.
If according to the judged result of step S206, User logs in account un-activation, then triggering the antitheft strategies of PC, by PC ends
End directly transmit it is antitheft instruct to server, or, in input PASSWORD and by checking after, transmission antitheft is instructed to clothes
Business device.Wherein, the form of the antitheft instruction can include order numbering(ACTIONID), mission number(TASKID)And it is additional
Information(OTHERS).For example, ACTIONID is Bind_By_PC, and TASKID is GUID, IMEI and password three for 0 and OTHERS
Person.
Step S210, to server send Bind instruction.
If according to the judged result of step S206, User logs in account is activated, then trigger the antitheft strategy of account.
Step S212, generation activation file.
Generation carries the IMEI and anti-theft modes mark activation file of mobile phone.Wherein, prevent if only needing mobile phone to open PC
Steal, then anti-theft modes are designated only including GUID or including GUID and PASSWORD.If only needing mobile phone unlatching account antitheft,
Anti-theft modes are designated.If mobile phone needs, and unlatching PC is antitheft and account is antitheft, anti-theft modes mark includes
GUID and UID or while including GUID, UID and PASSWORD three.
Step S214, will activation file send to mobile phone.
Step S216, notice mobile phone read activation file and open.
Specifically, read in mobile phone Android system and activate file and the step of opening be:Launching process, its process name and
Parameter is:adb shell am start-a BIND_FROM_PC-ncom.qihoo360.mobilesafe/
com.qihoo360.mobilesafe.PortalActivity-d/mnt/sdcard/Protection.dat.Wherein:BIND_
FROM_PC represents the Action of an Intent.Com.qihoo360.mobilesafe represents the bag name of ARIXTRA application.
Com.qihoo360.PortalActivity represents real for processing the Activity of activation./mnt/sdcard/
Protection.dat represents the path for getting through that file is put.
Fig. 3 shows the process chart of the theft preventing method according to one embodiment of the invention mobile phone side.Referring to Fig. 3,
The flow process at least includes step S302 to step S324.
Step S302, the activation instruction for receiving the transmission of PC terminals, judge its legitimacy.
After mobile phone receives the activation instruction of PC terminals transmission, judge whether the order in activation instruction is Bind_
From_PC, and the field in instruction is obtained, check that whether the field is the path of complete activation file.If in activation instruction
Order be Bind_From_PC, then decision instruction is legal, execution step S304, if illegal, flow process terminates.
Step S304, parsing activation file, the IMEI carried in obtaining activation file.
Step S306, judge that IMEI is whether correct, if so, execution step S308, if it is not, execution step S310.
The anti-theft modes mark carried in step S308, reading activation file, and preserve.
Following information is being preserved locally:
When anti-theft modes are identified only includes GUID, the antitheft strategies of PC are opened, directly perform the corresponding operation of antitheft order.
When anti-theft modes mark includes GUID and PASSWORD, the antitheft strategies of PC are opened, whether just checking PASSWROD
Really;If so, then perform the corresponding operation of antitheft order;If it is not, then stopping response.
When anti-theft modes mark includes UID, the antitheft strategy of account is opened, USERNAME is logged in this mobile terminal,
Receive the antitheft order from UID and perform corresponding operation.
When anti-theft modes mark include GUID and UID when, open PC it is antitheft strategy and the antitheft strategy of account, reception from
The antitheft order of PC terminals or UID simultaneously performs corresponding operation.
When anti-theft modes mark includes GUID, UID and PASSWORD, the antitheft strategies of PC and the antitheft strategy of account are opened,
Receive from PC terminals or state the antitheft order of UID PASSWORD is verified;If being verified, reception is performed
The corresponding operation of antitheft order;If checking does not pass through, stop response.
In this mobile terminal, different anti-theft modes can be opened after receiving command adapted thereto, now to mobile terminal itself
How to arrange the different anti-theft modes of respective attributes value unlatching to illustrate.
When anti-theft modes are identified only includes GUID:
1., in setting options, " the antitheft sign identifier value of PC " is set to GUID value.
2., in setting options, " opening the antitheft values of PC " is true.
When anti-theft modes mark includes GUID and PASSWORD:
1., in setting options, " the antitheft sign identifier value of PC " is set to GUID value.
2., in setting options, " PC anti-theft cipher values " is password value.
3., in setting options, " opening the antitheft values of PC " is true.
When anti-theft modes mark includes UID:
1., in setting options, " account number identity value " is set to UID values.
2., in setting options, " account number name value " is set to USERNAME values.
3., in setting options, " opening account anti-theft value " is True.
Note:" opening the antitheft values of PC " is not provided with herein, because it is antitheft to be not turned on PC.
When anti-theft modes mark includes GUID and UID:
1., in setting options, " the antitheft sign identifier value of PC " is GUID value.
2., in setting options, " account number identity value " is UID values.
3., in setting options, " account number name value " is set to USERNAME values.
4., in setting options, " opening account anti-theft value " is true.
5., in setting options, " opening the antitheft values of PC " is true.
When anti-theft modes mark includes GUID, UID and PASSWORD:
1., in setting options, " the antitheft sign identifier value of PC " is GUID value.
2., in setting options, " PC anti-theft cipher values " is password value.
3., in setting options, " account number identity value " is UID values.
4., in setting options, " account number name value " is set to USERNAME values.
5., in setting options, " opening account anti-theft value " is true.
6., in setting options, " opening the antitheft values of PC " is true.
When anti-theft modes mark includes other situations, by failure handling.
Step S310, the failure of opening anti-theft function.
Step S312, opening anti-theft function success.
Step S314, the antitheft instruction for receiving the transmission of PC terminals.
Step S316, the antitheft instruction of parsing, obtain antitheft order and identity.
Step S318, the identity to carrying in antitheft instruction are verified.If being verified, execution step S320,
If checking does not pass through, flow process terminates.
Step S320, the corresponding operation of the antitheft order of execution.
Whether the antitheft order of step S322, poll inquiry runs succeeded.If so, execution step S324, if it is not, continuing executing with
The step.
Step S324, antitheft order run succeeded, and return implementing result to PC terminals, and flow process terminates.
Based on the anti-theft method for mobile terminal that each preferred embodiment is provided above, based on same inventive concept, the present invention is real
Apply example and a kind of guarding against theft for mobile terminal client is provided, for realizing above-mentioned anti-theft method for mobile terminal.
Fig. 4 shows the structural representation of guarding against theft for mobile terminal client according to an embodiment of the invention.Referring to figure
4, the client of the embodiment of the present invention at least includes:Receiver module 430, parsing module 440 and performing module 450.
The function and each several part of each device or composition of the guarding against theft for mobile terminal client of the embodiment of the present invention are introduced now
Between annexation:
Receiver module 430, is configured to receive the antitheft instruction from PC terminals.
Parsing module 440, is coupled with receiver module 430, is configured to parse antitheft instruction, obtains the instruction corresponding anti-
Steal order.
Performing module 450, is coupled with parsing module 440, is configured to perform the corresponding operation of antitheft order, to realize moving
Dynamic terminal anti-theft.
In embodiments of the present invention, the antitheft instruction from PC terminals is received, and antitheft life is obtained by parsing antitheft instruction
Order, and according to antitheft order, it is able to carry out corresponding antitheft operation.As can be seen here, the antitheft instruction in the embodiment of the present invention
From PC terminals can be used, on the premise of the non-opening anti-theft function of stolen mobile terminal, open and using mobile terminal
Anti-theft feature.Antitheft instruction is sent using PC terminals, it is simple to operate such that it is able to conveniently and efficiently to realize the anti-of mobile terminal
Steal, and can provide perfect anti-theft feature carries out antitheft to mobile terminal, solves in prior art, and mobile terminal is stolen
Afterwards, it is impossible to which continuation carries out antitheft problem to mobile terminal.The embodiment of the present invention is still able to after mobile terminal is stolen
The antitheft instruction of sender is received, and antitheft operation is performed according to the antitheft order for parsing antitheft instruction acquisition.For example, user
After mobile terminal is lost, instruct to stolen mobile terminal by transmission is antitheft, the embodiment of the present invention can be to stolen mobile whole
End carries out screen locking operation, prevents stealer from using mobile terminal.Stealer cannot cause stealer lead to using mobile terminal
The operation renovation mobile terminal such as brush machine is crossed, and then stolen mobile terminal cannot be resell and be earned a profit by stealer.Further, can
The probability that stealing crime occurs is reduced effectively.In addition, according to the antitheft instruction for receiving, the embodiment of the present invention can also be obtained steathily
The identification information of robber person(The such as photo of stealer, fingerprint etc.).The identity of stealer is got according to embodiments of the present invention
After identification information, stealer can be arrested according to above-mentioned identification information.Therefore, the embodiment of the present invention can reach
To terminal it is stolen after effectively terminal is carried out antitheft, and reduce stealing crime rate, the beneficial effect of protection user's property safety
Really.
Receiver module 430 was received before the antitheft instruction of PC terminals, active module 420 receive from PC terminals,
Carry the identity of this mobile terminal and the activation file of anti-theft modes mark.After receiving activation file, activation
Module 420 is verified to activating file according to the identity of the mobile terminal carried in activation file.If in activation file
The identity of the mobile terminal of carrying is the identity of this mobile terminal, then activate file by checking.If activation file
The identity of the mobile terminal of middle carrying is not the identity of this mobile terminal, then activate file not verified.When sharp
After file living is by checking, active module 420 determines different antitheft moulds according to the anti-theft modes mark that activation file is carried
Formula.
According to the different information that different antitheft pattern identifications include, anti-theft modes mark being divided into and only include at random
First group of anti-theft modes mark of character string GUID, including GUID and password(PASSWORD)Second group of anti-theft modes mark,
Only include account identifier(UID)The 3rd group of anti-theft modes mark, including GUID and UID the 4th group of anti-theft modes mark with
And while including the 5th group of anti-theft modes mark of GUID, UID, PASSWORD three.Now different to five groups anti-theft modes marks
Know and its effect is illustrated respectively.
When anti-theft modes are designated first group of anti-theft modes mark only including GUID, active module 420 is opened PC and is prevented
Strategy is stolen, and corresponding antitheft operation is directly performed according to the antitheft order for receiving.Wherein, GUID be PC terminals generate with
Machine character string, and the character string can set up one-to-one binding relationship with mobile terminal.
When anti-theft modes are designated second group of anti-theft modes mark including GUID and PASSWORD, active module 420
The antitheft strategies of PC are opened, and whether PASSWORD is correctly verified.If so, then perform the antitheft order for receiving corresponding
Antitheft operation.If it is not, then stopping response, any operation is not performed.Wherein, the password that the PASSWORD is pre-set for user,
When the password value is not space-time, the embodiment of the present invention is verified to the PASSWORD before antitheft order is performed.
When anti-theft modes are designated the 3rd group of anti-theft modes mark only including UID, active module 420 is opened account and is prevented
Steal strategy.Wherein, UID is the account for identifying account that generates after the account of the entitled USERSNAME of User logs in account
Symbolic identifier.
When anti-theft modes are designated the 4th group of anti-theft modes mark including UID and GUID, active module 420 is opened
The antitheft strategies of PC and the antitheft strategy of account, receive the antitheft instruction from PC terminals or UID and perform corresponding antitheft behaviour
Make.
When anti-theft modes are designated while when identifying including the 5th group of anti-theft modes of GUID, UID, PASSWORD three,
Active module 420 opens the antitheft strategies of PC and the antitheft strategy of account.Also, receive from the antitheft of PC terminals or UID
It is required to verify PASSWORD during order first.Secondly, whether next step behaviour is carried out by checking according to PASSWORD
Make.Specifically, when by when, the embodiment of the present invention performs the corresponding antitheft operation of antitheft order that receives, when obstructed out-of-date,
The embodiment of the present invention stops response, does not perform any operation.
As described above, the difference for activating the anti-theft modes mark carried in file for being sent according to PC, the present invention are implemented
Example can activate different anti-theft modes.That is, when antitheft operation is carried out by PC terminal-pairs mobile terminal, can by PC terminals
Antitheft order is sent to mobile terminal to trigger a kind of antitheft strategy, various antitheft strategies can also be triggered while to mobile terminal
Send antitheft order.For example, when the anti-theft modes in file is activated are designated, this
Bright embodiment can only carry out the antitheft strategy of account respectively or only carry out the antitheft strategies of PC.Anti-theft modes in activation file
It is designated while during including UID and GUID, the embodiment of the present invention can carry out that PC is antitheft and account is antitheft simultaneously, and it is right to strengthen
The anti-theft protection of mobile terminal, increase give the probability of mobile terminal for change.
In addition, in the embodiment of the present invention, personal settings can be carried out to PASSWORD.If user arranges PASSWORD,
Before antitheft operation is performed, the PASSWORD is verified, malicious peer can be avoided to send antitheft instruction causes movement
End-error performs antitheft operation(Such as malice screen locking, reveal real-time position information etc.)Cause severe consequence.User can also
The setting of PASSWORD is not carried out as needed, terminal anti-theft is moved by PC terminals or account directly, it is to avoid step is numerous
It is trivial.
In the embodiment of the present invention, active module 420 is according to the anti-theft modes mark activation in the activation file by checking
After corresponding anti-theft modes, coupled receiver module 430 is triggered.After receiver module 430 receives antitheft instruction,
Trigger parsing module 440 is parsed to antitheft instruction, the identity of this mobile terminal carried in obtaining antitheft instruction, and
Which is verified.If by checking, the triggering of the parsing module 440 corresponding antitheft behaviour of the antitheft order of performing module 450 pairs
Performed, to realize guarding against theft for mobile terminal.If checking does not pass through, stop response, do not perform any operation.
During arbitrary antitheft order is performed, 460 poll inquiry of poller module being coupled with performing module 450
Whether the antitheft order runs succeeded, and if so, then the triggering of poller module 460 performing module 450 terminates the execution of the antitheft order,
If it is not, then the triggering of poller module 460 performing module 450 again attempts to perform the antitheft order.In the embodiment of the present invention, poll mould
Block 460 to the implementation status of antitheft order be polled inquiry ensure acquisition for mobile terminal to antitheft order can be held in time
OK, it is to avoid order execution to cause stealer that brush machine or other operations are carried out to mobile terminal so that mobile whole not in time because antitheft
End cannot be retrieved.For example, the embodiment of the present invention will perform lock-screen order, and whether the lock-screen order is performed into
Work(is inquired about.If lock-screen order is not carried out, the embodiment of the present invention performs lock-screen order, the screen to mobile terminal
Curtain is locked.If lock-screen order runs succeeded, the embodiment of the present invention is abandoned performing the screen locking order again.
In addition, this mobile terminal for being located of guarding against theft for mobile terminal client as shown in Figure 4 by with 420 phase of active module
The interface 410 of coupling is attached with PC terminals to be got through.In the embodiment of the present invention, interface 410 can pass through wired or wireless
This mobile terminal is attached with PC terminals and is got through by mode.For example, interface 410 can be entered with PC terminals by USB data line
Row connection.Again for example, interface 410 can be attached by the wireless modes such as bluetooth, wireless network and PC terminals.It is of the invention real
Apply in example, PC terminals can be attached and be got through by wired or wireless mode with interface 410, facilitate PC terminals and shifting
Dynamic terminal is in several ways or means are attached and get through, and then mobile terminal can be carried out by PC antitheft, has
Effect ensures the safety of mobile terminal.
According to the combination of above-mentioned any one preferred embodiment or multiple preferred embodiments, the embodiment of the present invention can reach
Following beneficial effect:
In embodiments of the present invention, the antitheft instruction from PC terminals is received, and antitheft life is obtained by parsing antitheft instruction
Order, and according to antitheft order, it is able to carry out corresponding antitheft operation.As can be seen here, the antitheft instruction in the embodiment of the present invention
From PC terminals can be used, on the premise of the non-opening anti-theft function of stolen mobile terminal, open and using mobile terminal
Anti-theft feature.Antitheft instruction is sent using PC terminals, it is simple to operate such that it is able to conveniently and efficiently to realize the anti-of mobile terminal
Steal, and can provide perfect anti-theft feature carries out antitheft to mobile terminal, solves in prior art, and mobile terminal is stolen
Afterwards, it is impossible to which continuation carries out antitheft problem to mobile terminal.The embodiment of the present invention is still able to after mobile terminal is stolen
The antitheft instruction of sender is received, and antitheft operation is performed according to the antitheft order for parsing antitheft instruction acquisition.For example, user
After mobile terminal is lost, instruct to stolen mobile terminal by transmission is antitheft, the embodiment of the present invention can be to stolen mobile whole
End carries out screen locking operation, prevents stealer from using mobile terminal.Stealer cannot cause stealer lead to using mobile terminal
The operation renovation mobile terminal such as brush machine is crossed, and then stolen mobile terminal cannot be resell and be earned a profit by stealer.Further, can
The probability that stealing crime occurs is reduced effectively.In addition, according to the antitheft instruction for receiving, the embodiment of the present invention can also be obtained steathily
The identification information of robber person(The such as photo of stealer, fingerprint etc.).The identity of stealer is got according to embodiments of the present invention
After identification information, stealer can be arrested according to above-mentioned identification information.Therefore, the embodiment of the present invention can reach
To terminal it is stolen after effectively terminal is carried out antitheft, and reduce stealing crime rate, the beneficial effect of protection user's property safety
Really.
In description mentioned herein, a large amount of details are illustrated.It is to be appreciated, however, that the enforcement of the present invention
Example can be put into practice in the case where not having these details.In some instances, known method, structure is not been shown in detail
And technology, so as not to obscure the understanding of this description.
Similarly, it will be appreciated that in order to simplify the disclosure and help understand one or more in each inventive aspect, exist
Above to, in the description of the exemplary embodiment of the present invention, each feature of the present invention is grouped together into single enforcement sometimes
In example, figure or descriptions thereof.However, should the method for the disclosure be construed to reflect following intention:I.e. required guarantor
The more features of feature is expressly recited in each claim by the application claims ratio of shield.More precisely, such as following
Claims it is reflected as, inventive aspect is less than all features of single embodiment disclosed above.Therefore,
Thus the claims for following specific embodiment are expressly incorporated in the specific embodiment, wherein each claim itself
All as the separate embodiments of the present invention.
Those skilled in the art are appreciated that can be carried out adaptively to the module in the equipment in embodiment
Change and they are arranged in one or more different from embodiment equipment.Can be the module or list in embodiment
Unit or component are combined into a module or unit or component, and can be divided in addition multiple submodule or subelement or
Sub-component.In addition at least some in such feature and/or process or unit is excluded each other, can adopt any
Combination is to this specification(Including adjoint claim, summary and accompanying drawing)Disclosed in all features and so disclosed appoint
Where all processes or unit of method or equipment are combined.Unless expressly stated otherwise, this specification(Including adjoint power
Profit requires, makes a summary and accompanying drawing)Disclosed in each feature can be by providing identical, equivalent or the alternative features of similar purpose carry out generation
Replace.
Although additionally, it will be appreciated by those of skill in the art that some embodiments described herein include other embodiments
In some included features rather than further feature, but the combination of the feature of different embodiments means in of the invention
Within the scope of and form different embodiments.For example, in detail in the claims, embodiment required for protection one of arbitrarily
Can in any combination mode using.
The present invention all parts embodiment can be realized with hardware, or with one or more processor operation
Software module realize, or with combinations thereof realize.It will be understood by those of skill in the art that can use in practice
Microprocessor or digital signal processor(DSP)To realize in guarding against theft for mobile terminal equipment according to embodiments of the present invention
The some or all functions of a little or whole parts.The present invention is also implemented as performing method as described herein
Some or all equipment or program of device(For example, computer program and computer program).Such realization
The program of the present invention can be stored on a computer-readable medium, or can have the form of one or more signal.This
The signal of sample can be downloaded from internet website and be obtained, or provide on carrier signal, or be carried with any other form
For.
It should be noted that above-described embodiment the present invention will be described rather than limits the invention, and ability
Field technique personnel can design alternative embodiment without departing from the scope of the appended claims.In the claims,
Any reference markss between bracket should not be configured to limitations on claims.Word "comprising" is not excluded the presence of not
Element listed in the claims or step.Word "a" or "an" before element does not exclude the presence of multiple such
Element.The present invention can come real by means of the hardware for including some different elements and by means of properly programmed computer
It is existing.If in the unit claim for listing equipment for drying, several in these devices can be by same hardware branch
To embody.The use of word first, second, and third does not indicate that any order.These words can be explained and be run after fame
Claim.
So far, although those skilled in the art will appreciate that detailed herein illustrate and describe multiple showing for the present invention
Example property embodiment, but, without departing from the spirit and scope of the present invention, still can be direct according to present disclosure
It is determined that or deriving many other variations or modifications for meeting the principle of the invention.Therefore, the scope of the present invention is understood that and recognizes
It is set to and covers all these other variations or modifications.
The embodiment of the invention also discloses A1, a kind of anti-theft method for mobile terminal, including:
Receive the antitheft instruction from PC PC terminal;
The antitheft instruction is parsed, the corresponding antitheft order of the instruction is obtained;
The corresponding operation of the antitheft order is performed, to realize guarding against theft for mobile terminal.
A2, the method according to A1, wherein, the antitheft instruction is parsed, the corresponding antitheft order of the instruction is obtained, is wrapped
Include:
The antitheft instruction is parsed, the identity of this mobile terminal carried in obtaining the antitheft instruction;
The identity is verified;
If being verified, that triggers the antitheft order performs operation;
If checking does not pass through, stop response.
A3, the method according to A2, wherein, the identity of described mobile terminal includes:Described mobile terminal
International Mobile Equipment Identity identification code IMEI.
A4, the method according to any one of A1 to A3, wherein, it is described to receive before the antitheft instruction of PC terminals,
Including:
The activation file from the PC terminals is received, wherein, the activation file carries described mobile terminal
Identity and anti-theft modes mark;
The activation file is verified according to the identity;
If being verified, the different anti-theft modes of activation are identified according to the anti-theft modes.
A5, the method according to A4, wherein, identified according to the anti-theft modes and determine different anti-theft modes, including:
If the anti-theft modes are designated PC anti-theft modes mark, start the antitheft strategies of PC;
If the anti-theft modes are designated account anti-theft modes mark, start the antitheft strategy of account.
A6, the method according to A4 or A5, wherein, the anti-theft modes mark includes at least one following:
The PC terminals are generated, and the one-to-one random string GUID of this mobile terminal;
Account identifier UID for identifying account generated after User logs in account, wherein, the User logs in of UID
The entitled USERNAME of account;
Password PASSWORD.
A7, the method according to any one of A4 to A6, wherein, identified according to the anti-theft modes determine it is different antitheft
Pattern, including:
If the anti-theft modes mark only includes the GUID, the antitheft strategies of PC are opened, the antitheft life is directly performed
Make corresponding operation;
If the anti-theft modes mark includes the GUID and PASSWORD, the antitheft strategies of PC are opened, institute is verified
PASSWROD is stated whether correct;If so, then perform the corresponding operation of the antitheft order;If it is not, then stopping response;
If the anti-theft modes mark includes the UID, the antitheft strategy of account is opened, is stepped in described mobile terminal
The USERNAME is recorded, the antitheft order from the UID is received and is performed corresponding operation;
If the anti-theft modes mark includes the GUID and UID, open the antitheft strategies of PC and account is antitheft
Strategy, receives the antitheft order from PC terminals or the UID and performs corresponding operation;
If anti-theft modes mark includes the GUID, the UID and the PASSWORD, open PC it is antitheft it is tactful with
And the antitheft strategy of account, receiving the antitheft order from the PC terminals or the UID is carried out to the PASSWORD
Checking;If being verified, the corresponding operation of antitheft order of reception is performed;If checking does not pass through, stop response.
A8, the method according to any one of A1 to A7, wherein, also include:
During any operation is performed, poll inquiry its whether run succeeded;
If so, then terminate the operation;
If it is not, then again attempting to perform the operation.
A9, the method according to any one of A1 to A8, wherein, after performing the corresponding operation of the antitheft order, also
Including:
Return implementing result as receipt to the PC terminals, wherein, if the PC terminals are not within a specified time received
The receipt, then initiate poll inquiry, inquiry whether receipt success;If so, then terminate receipt inquiry;If it is not, then asking again
Receipt.
A10, the method according to any one of A1 to A9, wherein, the PC terminals and this mobile terminal by wired or
Wireless mode connects and gets through, wherein, the wired mode includes general-purpose serial bus USB connecting line, the wireless mode bag
Include wireless network.
The embodiment of the invention also discloses B11, a kind of guarding against theft for mobile terminal client, including:
Receiver module, is configured to receive the antitheft instruction from PC PC terminal;
Parsing module, is configured to the parsing antitheft instruction, obtains the corresponding antitheft order of the instruction;
Performing module, is configured to perform the corresponding operation of the antitheft order, to realize guarding against theft for mobile terminal.
B12, the client according to B11, wherein, the parsing module is additionally configured to:
The antitheft instruction is parsed, the identity of this mobile terminal carried in obtaining the antitheft instruction;
The identity is verified;
If being verified, that triggers the antitheft order performs operation;
If checking does not pass through, stop response.
B13, the client according to B12, wherein, the identity of described mobile terminal includes:Described movement
The International Mobile Equipment Identity identification code IMEI of terminal.
B14, the client according to any one of B11 to B13, wherein, also include:Active module, is configured to:
The activation file from the PC terminals is received, wherein, the activation file carries described mobile terminal
Identity and anti-theft modes mark;
The activation file is verified according to the identity;
If being verified, the different anti-theft modes of activation are identified according to the anti-theft modes.
B15, the client according to B14, wherein, the active module is additionally configured to:
If the anti-theft modes are designated PC anti-theft modes mark, start the antitheft strategies of PC;
If the anti-theft modes are designated account anti-theft modes mark, start the antitheft strategy of account.
B16, the client according to B14 or B15, wherein, the anti-theft modes mark includes at least one following:
The PC terminals are generated, and the one-to-one random string GUID of this mobile terminal;
Account identifier UID for identifying account generated after User logs in account, wherein, the User logs in of UID
The entitled USERNAME of account;
Password PASSWORD.
B17, the client according to any one of B14 to B16, wherein, the active module is additionally configured to:
If the anti-theft modes mark only includes the GUID, the antitheft strategies of PC are opened, the antitheft life is directly performed
Make corresponding operation;
If the anti-theft modes mark includes the GUID and PASSWORD, the antitheft strategies of PC are opened, institute is verified
PASSWROD is stated whether correct;If so, then perform the corresponding operation of the antitheft order;If it is not, then stopping response;
If the anti-theft modes mark includes the UID, the antitheft strategy of account is opened, is stepped in described mobile terminal
The USERNAME is recorded, the antitheft order from the UID is received and is performed corresponding operation;
If the anti-theft modes mark includes the GUID and UID, open the antitheft strategies of PC and account is antitheft
Strategy, receives the antitheft order from PC terminals or the UID and performs corresponding operation;
If anti-theft modes mark includes the GUID, the UID and the PASSWORD, the PC that opens an account it is antitheft it is tactful with
And the antitheft strategy of account, receiving the antitheft order from the PC terminals or the UID is carried out to the PASSWORD
Checking;If being verified, the corresponding operation of antitheft order of reception is performed;If checking is not notified, stop response.
B18, the client according to any one of B11 to B17, wherein, also including poller module, it is configured to:
During any operation is performed, poll inquiry its whether run succeeded;
If so, then terminate the operation;
If it is not, then again attempting to perform the operation.
B19, the client according to any one of B11 to B18, wherein, also include:
Interface, is configured to pass wired or wireless way and connects the PC terminals and this mobile terminal, wherein, it is described wired
Mode includes general-purpose serial bus USB connecting line, and the wireless mode includes wireless network.
Claims (17)
1. a kind of anti-theft method for mobile terminal, including:
Receive the antitheft instruction from PC PC terminal;
The antitheft instruction is parsed, the corresponding antitheft order of the instruction is obtained;
The corresponding operation of the antitheft order is performed, to realize guarding against theft for mobile terminal,
Wherein, it is described reception before the antitheft instruction of PC terminals, including:
The activation file from the PC terminals is received, wherein, the activation file carries the identity of this mobile terminal
And anti-theft modes mark;
The activation file is verified according to the identity;
If being verified, the different anti-theft modes of activation are identified according to the anti-theft modes.
2. method according to claim 1, wherein, the antitheft instruction is parsed, the corresponding antitheft order of the instruction is obtained,
Including:
The antitheft instruction is parsed, the identity of this mobile terminal carried in obtaining the antitheft instruction;
The identity is verified;
If being verified, that triggers the antitheft order performs operation;
If checking does not pass through, stop response.
3. method according to claim 2, wherein, the identity of described mobile terminal includes:Described mobile whole
The International Mobile Equipment Identity identification code IMEI at end.
4. method according to claim 1, wherein, identified according to the anti-theft modes and determine different anti-theft modes, bag
Include:
If the anti-theft modes are designated PC anti-theft modes mark, start the antitheft strategies of PC;
If the anti-theft modes are designated account anti-theft modes mark, start the antitheft strategy of account.
5. the method according to claim 1 or 4, wherein, the anti-theft modes mark includes at least one following:
The PC terminals are generated, and the one-to-one random string GUID of this mobile terminal;
Account identifier UID for identifying account generated after User logs in account, wherein, the account of the User logs in of UID
Entitled USERNAME;
Password PASSWORD.
6. method according to claim 5, wherein, identified according to the anti-theft modes and determine different anti-theft modes, bag
Include:
If the anti-theft modes mark only includes the GUID, the antitheft strategies of PC are opened, directly perform the antitheft order right
The operation answered;
If the anti-theft modes mark includes the GUID and PASSWORD, the antitheft strategies of PC are opened, checking is described
Whether PASSWROD is correct;If so, then perform the corresponding operation of the antitheft order;If it is not, then stopping response;
If the anti-theft modes mark includes the UID, the antitheft strategy of account is opened, institute is logged in described mobile terminal
USERNAME is stated, the antitheft order from the UID is received and is performed corresponding operation;
If the anti-theft modes mark includes the GUID and UID, the antitheft strategies of PC and the antitheft strategy of account are opened,
Receive the antitheft order from PC terminals or the UID and perform corresponding operation;
If the anti-theft modes mark includes the GUID, the UID and the PASSWORD, the antitheft strategies of PC and account are opened
Number antitheft strategy, receives the antitheft order from the PC terminals or the UID and the PASSWORD is verified;
If being verified, the corresponding operation of antitheft order of reception is performed;If checking does not pass through, stop response.
7. the method according to any one of Claims 1-4, wherein, also include:
During any operation is performed, poll inquiry its whether run succeeded;
If so, then terminate the operation;
If it is not, then again attempting to perform the operation.
8. the method according to any one of Claims 1-4, wherein, after performing the corresponding operation of the antitheft order, also
Including:
Return implementing result as receipt to the PC terminals, wherein, if the PC terminals within a specified time do not receive it is described
Receipt, then initiate poll inquiry, inquiry whether receipt success;If so, then terminate receipt inquiry;If it is not, then asking receipt again.
9. the method according to any one of Claims 1-4, wherein, the PC terminals and this mobile terminal by wired or
Wireless mode connects and gets through, wherein, the wired mode includes general-purpose serial bus USB connecting line, the wireless mode bag
Include wireless network.
10. a kind of guarding against theft for mobile terminal client, including:
Receiver module, is configured to receive the antitheft instruction from PC PC terminal;
Parsing module, is configured to the parsing antitheft instruction, obtains the corresponding antitheft order of the instruction;
Performing module, is configured to perform the corresponding operation of the antitheft order, to realize guarding against theft for mobile terminal,
The guarding against theft for mobile terminal client also includes:Active module, is configured to:
The activation file from the PC terminals is received, wherein, the activation file carries the identity of this mobile terminal
And anti-theft modes mark;
The activation file is verified according to the identity;
If being verified, the different anti-theft modes of activation are identified according to the anti-theft modes.
11. clients according to claim 10, wherein, the parsing module is additionally configured to:
The antitheft instruction is parsed, the identity of this mobile terminal carried in obtaining the antitheft instruction;
The identity is verified;
If being verified, that triggers the antitheft order performs operation;
If checking does not pass through, stop response.
12. clients according to claim 11, wherein, the identity of described mobile terminal includes:Described shifting
The International Mobile Equipment Identity identification code IMEI of dynamic terminal.
13. clients according to claim 10, wherein, the active module is additionally configured to:
If the anti-theft modes are designated PC anti-theft modes mark, start the antitheft strategies of PC;
If the anti-theft modes are designated account anti-theft modes mark, start the antitheft strategy of account.
14. clients according to claim 10 or 13, wherein, the anti-theft modes mark includes at least one following:
The PC terminals are generated, and the one-to-one random string GUID of this mobile terminal;
Account identifier UID for identifying account generated after User logs in account, wherein, the account of the User logs in of UID
Entitled USERNAME;
Password PASSWORD.
15. clients according to claim 14, wherein, the active module is additionally configured to:
If the anti-theft modes mark only includes the GUID, the antitheft strategies of PC are opened, directly perform the antitheft order right
The operation answered;
If the anti-theft modes mark includes the GUID and PASSWORD, the antitheft strategies of PC are opened, checking is described
Whether PASSWROD is correct;If so, then perform the corresponding operation of the antitheft order;If it is not, then stopping response;
If the anti-theft modes mark includes the UID, the antitheft strategy of account is opened, institute is logged in described mobile terminal
USERNAME is stated, the antitheft order from the UID is received and is performed corresponding operation;
If the anti-theft modes mark includes the GUID and UID, the antitheft strategies of PC and the antitheft strategy of account are opened,
Receive the antitheft order from PC terminals or the UID and perform corresponding operation;
If the anti-theft modes mark includes the GUID, the UID and the PASSWORD, the antitheft strategies of the PC that opens an account and account
Number antitheft strategy, receives the antitheft order from the PC terminals or the UID and the PASSWORD is verified;
If being verified, the corresponding operation of antitheft order of reception is performed;If checking is not notified, stop response.
16. clients according to any one of claim 10 to 13, wherein, also including poller module, it is configured to:
During any operation is performed, poll inquiry its whether run succeeded;
If so, then terminate the operation;
If it is not, then again attempting to perform the operation.
17. clients according to any one of claim 10 to 13, wherein, also include:
Interface, is configured to pass wired or wireless way and connects the PC terminals and this mobile terminal, wherein, the wired mode
Including general-purpose serial bus USB connecting line, the wireless mode includes wireless network.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310686970.7A CN103716791B (en) | 2013-12-13 | 2013-12-13 | Anti-theft method for mobile terminal and client |
PCT/CN2014/093636 WO2015085940A1 (en) | 2013-12-13 | 2014-12-11 | Mobile terminal antitheft method and client |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310686970.7A CN103716791B (en) | 2013-12-13 | 2013-12-13 | Anti-theft method for mobile terminal and client |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103716791A CN103716791A (en) | 2014-04-09 |
CN103716791B true CN103716791B (en) | 2017-04-05 |
Family
ID=50409262
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310686970.7A Active CN103716791B (en) | 2013-12-13 | 2013-12-13 | Anti-theft method for mobile terminal and client |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103716791B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2015085940A1 (en) * | 2013-12-13 | 2015-06-18 | 北京奇虎科技有限公司 | Mobile terminal antitheft method and client |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101222692A (en) * | 2007-01-09 | 2008-07-16 | 中兴通讯股份有限公司 | Terminal anti-theft method based on terminal management service |
CN101393589A (en) * | 2008-07-25 | 2009-03-25 | 深圳市创智成科技有限公司 | Notebook computer, mobile communication anti-theft device and anti-theft method thereof |
CN102164361A (en) * | 2011-03-29 | 2011-08-24 | 福建鑫诺通讯技术有限公司 | Anti-theft method for mobile terminal |
CN102231740A (en) * | 2011-06-24 | 2011-11-02 | 中兴通讯股份有限公司 | Antitheft platform, client, terminal and antitheft processing method for mobile terminal |
CN103392328A (en) * | 2012-12-21 | 2013-11-13 | 华为技术有限公司 | Communication terminal work remote control server and method and communication terminal |
-
2013
- 2013-12-13 CN CN201310686970.7A patent/CN103716791B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101222692A (en) * | 2007-01-09 | 2008-07-16 | 中兴通讯股份有限公司 | Terminal anti-theft method based on terminal management service |
CN101393589A (en) * | 2008-07-25 | 2009-03-25 | 深圳市创智成科技有限公司 | Notebook computer, mobile communication anti-theft device and anti-theft method thereof |
CN102164361A (en) * | 2011-03-29 | 2011-08-24 | 福建鑫诺通讯技术有限公司 | Anti-theft method for mobile terminal |
CN102231740A (en) * | 2011-06-24 | 2011-11-02 | 中兴通讯股份有限公司 | Antitheft platform, client, terminal and antitheft processing method for mobile terminal |
CN103392328A (en) * | 2012-12-21 | 2013-11-13 | 华为技术有限公司 | Communication terminal work remote control server and method and communication terminal |
Also Published As
Publication number | Publication date |
---|---|
CN103716791A (en) | 2014-04-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104601324B (en) | A kind of verification method, terminal and system for application | |
CN103702317B (en) | Anti-theft method for mobile terminal and client | |
US10231124B2 (en) | Anti-theft method and client for a mobile terminal | |
CN109525604A (en) | A kind of method and relevant device of account binding | |
CN107426202B (en) | Method for automatically testing WAF (Wireless Access Filter) interception rule | |
CN103702318A (en) | Mobile terminal antitheft method and client | |
CN103634935B (en) | WPS (Wi-Fi protected setup) or QSS (quick secure setup)-based network accessing method and device | |
CN110727938B (en) | Configuration method and device of intelligent equipment, electronic equipment and storage medium | |
CN107426243A (en) | A kind of network safety protection method and device | |
CN104751105A (en) | Fingerprint data verification method, fingerprint data verification device, related equipment and system | |
CN108924137A (en) | Method for secret protection and system under a kind of environment of internet of things | |
CN105163312B (en) | Wireless network access method and Wireless network connection equipment | |
CN106507300A (en) | A kind of method for giving loss terminal for change, device and terminal | |
CN103716791B (en) | Anti-theft method for mobile terminal and client | |
CN103379478B (en) | Control method, control system, client terminal and server | |
CN103501334B (en) | Data transmission method, equipment and network system | |
CN109639434A (en) | A kind of method for unlocking based on block chain, device, system and calculate equipment | |
CN106331169A (en) | Method for reporting loss of mobile terminal and cloud customer terminal, cloud server, mobile terminal | |
CN104348804A (en) | Offline automatic service locking method, apparatus and system | |
CN109150852A (en) | A kind of account number safe login method, apparatus and system | |
CN109005193A (en) | Alarming method for power, device and electric terminal | |
CN103702314B (en) | The processing method of stolen terminal and equipment | |
CN108494749A (en) | Method, apparatus, equipment and the computer readable storage medium of IP address disabling | |
CN107145342A (en) | The treating method and apparatus of the channel information of application | |
CN106911653A (en) | A kind of method for realizing mobile terminal remote control, device, mobile terminal and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20220729 Address after: Room 801, 8th floor, No. 104, floors 1-19, building 2, yard 6, Jiuxianqiao Road, Chaoyang District, Beijing 100015 Patentee after: BEIJING QIHOO TECHNOLOGY Co.,Ltd. Address before: 100088 room 112, block D, 28 new street, new street, Xicheng District, Beijing (Desheng Park) Patentee before: BEIJING QIHOO TECHNOLOGY Co.,Ltd. Patentee before: Qizhi software (Beijing) Co.,Ltd. |
|
TR01 | Transfer of patent right |