Processing method for stolen terminal and server

A processing method and server technology, applied in the field of Internet applications, can solve the problem of not being able to identify whether the terminal is stolen or not.

Active Publication Date: 2014-04-02
BEIJING QIHOO TECH CO LTD
View PDF5 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Most people, especially when the thief buys and sells the stolen terminal, the person who buys the stolen terminal cannot identify whether the terminal is stolen
This technical defect makes it easy for users to purchase stolen terminals, further promoting the occurrence of illegal acts of stealing terminals.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Processing method for stolen terminal and server
  • Processing method for stolen terminal and server
  • Processing method for stolen terminal and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0043] figure 2 A processing flowchart of a processing method for a stolen terminal according to a preferred embodiment of the present invention is shown, any one of the above processing methods for a stolen terminal is supported, and the above processing method for a stolen terminal is explained more clearly and understandably. see figure 2 , the process includes at least step S202 to step S210.

[0044] It should be noted that, in order to explain this preferred embodiment more simply and clearly, in this preferred embodiment, the sender of the state modification message is set to the mobile phone of relatives and friends, and the terminal is set as a stolen mobile phone, wherein the mobile phone of relatives and friends is stolen The mobile phone where the relative or friend number bound to the mobile phone is located.

[0045] Step S202, sending a status modification message to mark the mobile phone as stolen.

[0046] Specifically, after the user discovers that the m...

Embodiment 2

[0055] image 3 It shows a processing flowchart of a processing method for a stolen terminal according to another preferred embodiment of the present invention, always supports any one of the above processing methods for a stolen terminal, and makes the above processing method for a stolen terminal clearer and easier to understand. see image 3 , the process includes at least step S302 to step S310.

[0056] It should be noted that, in order to explain this preferred embodiment more simply and clearly, in this preferred embodiment, the sender of the state modification message is set as a personal computer, and the terminal is set as a stolen mobile phone.

[0057] Step S302, sending a status modification message to mark the mobile phone as stolen.

[0058] Specifically, after the user finds that the mobile phone is stolen, the user can send a status modification message to the server through the personal computer. When using a personal computer, this preferred embodiment ca...

Embodiment 3

[0067] Figure 4 It shows a processing flowchart of a processing method for a stolen terminal according to yet another preferred embodiment of the present invention, supports any one of the above processing methods for a stolen terminal, and makes the above processing method for a stolen terminal clearer and easier to understand. see Figure 4 , the process includes at least step S402 to step S410.

[0068] It should be noted that, in order to explain this preferred embodiment more simply and clearly, in this preferred embodiment, the sender of the state modification message is set to the mobile phone of relatives and friends, and the terminal is set as a stolen mobile phone, wherein the mobile phone of relatives and friends is stolen The mobile phone where the relative or friend number bound to the mobile phone is located.

[0069] Step S402, sending a status modification message to mark the mobile phone as stolen.

[0070] Specifically, after the user discovers that the mob...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a processing method for a stolen terminal and a server. The method comprises the steps of receiving a state modification message from a sender, wherein the state modification message carries identity identification information of the terminal and the current state of the terminal; verifying the legality of the state modification message through the server; modifying the state information of the terminal corresponding to the identity identification information into the current state according to the state modification message which passes the legality verification. According to the processing method disclosed by the embodiment of the invention, the state information of the terminal can be modified, the problem that the fact whether the terminal is stolen cannot be indicated by other identifications in the prior art can be solved, and the beneficial effects that the finding probability of the stolen terminal can be increased and stealing behaviors are effectively contained can be achieved.

Description

technical field [0001] The invention relates to the field of Internet applications, in particular to a method for processing a stolen terminal and a server. Background technique [0002] With the rapid development of smart terminals and networks, terminals (including computers, mobile phones, tablets and other devices) play an increasingly important role in people's lives, and have become an indispensable part of people's work and life. Orientation "assistant". For the convenience of use, when people use terminal applications, they usually directly store information such as various account information, private chat records, pictures and photos in the terminal. Therefore, if the terminal is lost, it will not only bring property loss to the user, but more importantly, the user's private information stored in the terminal, such as financial information such as account passwords. If the private information is leaked, the loss to the user is difficult to estimate. Therefore, t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31G06F21/88
CPCG06F21/31G06F21/88
Inventor 范国峰闫学松姜燕北李彬
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products