Movatterモバイル変換


[0]ホーム

URL:


WO2012092723A1 - Theft processing method and apparatus - Google Patents

Theft processing method and apparatus
Download PDF

Info

Publication number
WO2012092723A1
WO2012092723A1PCT/CN2011/071491CN2011071491WWO2012092723A1WO 2012092723 A1WO2012092723 A1WO 2012092723A1CN 2011071491 WCN2011071491 WCN 2011071491WWO 2012092723 A1WO2012092723 A1WO 2012092723A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
stolen
platform
theft
information
Prior art date
Application number
PCT/CN2011/071491
Other languages
French (fr)
Chinese (zh)
Inventor
熊静
王串辉
刘少华
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司filedCritical中兴通讯股份有限公司
Publication of WO2012092723A1publicationCriticalpatent/WO2012092723A1/en

Links

Classifications

Definitions

Landscapes

Abstract

The present invention provides a theft processing method and apparatus. The method includes: a Machine to Machine (M2M) terminal determines that it is thieved (S102); the M2M terminal performs theft processing (S104), wherein the theft processing includes at least one of the followings: transmitting to an M2M platform the information for indicating the M2M terminal has been thieved and the information for tracing the M2M terminal, dialing an alarm number and broadcasting the information for tracing the M2M terminal. The present invention achieves the effect of processing thefts reliably.

Description

被盗处理方法^置 技术领域 本发明涉及通信领域, 具体而言, 涉及一种被盗处理方法及装置。 背景技术 机器对机器 (machine to machine, 简称为 M2M ) 的应用日渐广泛, 支 持 M2M通讯协议的模块和行业应用装置构成了一体的 M2M终端, 这些终 端通过无线网络和 M2M平台以及其它 M2M终端进行数据通信, 以达到几 乎不用人工千预而完成数据釆集、 信息共享、 宏观调控等功能。 但是由于终 端侧大多无人值守, 而 JM艮多终端分布在室内室外多个地方, 对于某些具有 一定经济价值的行业应用装置, 例如传感器、 液晶屏、 高端 4聂像头而言, 安 全防盗是一个不容忽视的问题。 目前在相关技术中, 并没有对 M2M终端的 防盗处理。 发明内容 本发明的主要目的在于提供一种被盗处理方法及装置, 以至少解决上述 问题。 才艮据本发明的一个方面, 提供了一种被盗处理方法, 包括: 机器对机器 M2M终端确定其被盗; 所述 M2M终端进行被盗处理, 其中, 所述被盗处理 包括以下至少之一: 向 M2M平台发送用于指示所述 M2M终端已经被盗的 信息和用于追踪所述 M2M终端的信息、 拨打报警号码并播报所述用于追踪 所述 M2M终端的信息。 优选地, 所述 M2M终端确定其被盗包括: 所述 M2M终端接收到所述 M2M平台发送的用于指示所述 M2M终端已经被盗的消息。 优选地, 所述 M2M终端确定其被盗包括: 所述 M2M终端与所述 M2M 平台建立连接, 并在与所述 M2M平台进行一次正常的数据交互之后, 更新 防盗参数; 所述 M2M终端查询所述防盗参数是否被更新, 并在查询到所述 防盗参数在预定时长未被更新和 /或查询到所述防盗参数未被更新的次数到 达阈值的情况下, 确定所述 M2M终端被盗。 优选地, 所述用于追踪所述 M2M终端的信息为通过 GPS芯片釆集的所 述 M2M终端的位置信息。 优选地, 所述用于指示所述 M2M终端已经被盗的信息为防盗密钥, 其 中, 所述防盗密钥是所述 M2M终端与所述 M2M平台在合法接入时协商好 的并用于证明所述 M2M终端身份的安全码。 根据本发明的另一个方面, 还提供了一种被盗处理方法, 包括: M2M平 台接收来自所述 M2M终端发送的用于指示所述 M2M终端已经被盗的信息 和用于追踪所述 M2M终端的信息;所述 M2M平台确定所述 M2M终端被盗。 优选地, 还包括: 所述 M2M平台向所述 M2M终端发送用于指示所述 M2M终端已经被盗的消息。 优选地, 在所述 M2M平台发送所述用于指示所述 M2M终端已经被盗 的消息之前, 还包括: 所述 M2M平台在所述 M2M终端发送的数据异常的 情况下,确定所述 M2M终端被盗;或者,所述 M2M平台接收到向所述 M2M 终端发送所述用于指示所述 M2M终端已经被盗的消息的命令。 根据本发明的一个方面, 还提供了一种被盗处理装置, 位于 M2M终端 中, 包括: 确定模块, 设置为确定所述 M2M终端被盗; 处理模块, 设置为 对所述 M2M终端进行被盗处理, 其中, 所述被盗处理包括以下至少之一: 向 M2M平台发送用于指示所述 M2M终端已经被盗的信息和用于追踪所述 M2M终端的信息、拨打报警号码并播报所述用于追踪所述 M2M终端的信息。 才艮据本发明的另一个方面, 还提供了一种被盗处理装置, 位于 M2M平 台中, 包括: 接收模块, 设置为接收来自 M2M终端发送的用于指示 M2M 终端已经被盗的信息和用于追踪 M2M终端的信息; 确定模块, 设置为确定 M2M终端被盗。 通过本发明, 釆用 M2M终端确定其被盗; M2M终端进行被盗处理, 其 中, 被盗处理包括以下至少之一: 向 M2M平台发送用于指示 M2M终端已 经被盗的信息和用于追踪 M2M终端的信息、 拨打报警号码并播报用于追踪 M2M终端的信息。 解决了相关技术中没有对 M2M终端进行处理的问题, 进 而提高了 M2M终端的安全性。 附图说明 此处所说明的附图用来提供对本发明的进一步理解, 构成本申请的一部 分, 本发明的示意性实施例及其说明用于解释本发明, 并不构成对本发明的 不当限定。 在附图中: 图 1是根据本发明实施例的 M2M终端被盗处理方法的流程图一; 图 2是根据本发明实施例的 M2M终端被盗处理方法的流程图二; 图 3是根据本发明实施例的被盗处理装置的结构框图一; 图 4是根据本发明实施例的被盗处理装置的结构框图二; 图 5是才艮据本发明实施例的不更换 SIM卡情况下被盗处理的流程图; 图 6是才艮据本发明实施例的更换 SIM卡情况下被盗处理的流程图; 图 7是才艮据本发明实施例的无 SIM卡情况下被盗处理的流程图; 图 8是根据本发明实施例所釆用 M2M终端中的模块及各模块之间业务 相互关系的示意图。 具体实施方式 下文中将参考附图并结合实施例来详细说明本发明。 需要说明的是, 在 不冲突的情况下, 本申请中的实施例及实施例中的特征可以相互组合。 在本实施例中, 提供了一种 M2M终端被盗处理方法, 图 1是根据本发 明实施例的 M2M终端被盗处理方法的流程图一, 如图 1所示, 该流程包括 如下步 4聚: 步 4聚 S 102, M2M终端确定其被盗; 步 4聚 S 104, M2M终端进行被盗处理, 其中, 被盗处理可以包括以下至 少之一: 向 M2M平台发送用于指示 M2M终端已经被盗的信息和用于追踪 M2M终端的信息、 拨打报警号码并播报用于追踪 M2M终端的信息。 通过以上步 4聚, M2M终端在确定其被盗之后, 可以进行相关的处理, 当然, 在 M2M终端可以和 M2M平台通信的情况下, 可以向 M2M平台发送 用于追踪 M2M终端的信息。 当然, 同时, M2M终端可以拨打报警号码。 这 样就使 M2M被盗处理更加完善。 如果只进行了一种处理方式的话, 此时也 可以解决 M2M终端被盗之后的处理问题, 例如, M2M可以根据被盗之后的 通信条件, 选择不同的处理方法。 优选地, 在实施时, M2M终端确定其被盗的方式有艮多种, 以下以举 例的方式进行说明: 例如, 可以由 M2M平台确定 M2M终端被盗, 在 M2M平台确定 M2M 终端被盗之后, 向 M2M终端发送用于指示 M2M终端已经被盗的消息, 然 后, M2M终端接收到 M2M平台发送的用于指示 M2M终端已经被盗的消息。 这种方式可以在被盗终端没有更换 SIM卡的情况下应用, 由于不更换 SIM 卡, 终端将继续和 M2M平台进行数据交互, 这时 M2M平台就直接向终端 发送 4艮文。 其中, M2M平台可以在 M2M终端发送的数据异常的情况下, 确 定 M2M终端被盗; 或者, M2M平台可以接收到向 M2M终端发送用于指示 M2M终端已经被盗的消息的命令, 这种情况下, 可能是管理者或者其他监 控设备发现该 M2M终端被盗后向 M2M平台发送的该命令。 例如, 可以由 M2M终端确定其被盗。 其中的一种优选的确定方式可以 为: M2M终端与 M2M平台建立连接, 并在与 M2M平台进行一次正常的数 据交互之后, 更新防盗参数; M2M终端查询防盗参数是否被更新, 并在查 询到防盗参数在预定时长未被更新和 /或查询到防盗参数未被更新的次数到 达阈值的情况下, 确定所述 M2M终端被盗。 这种处理方式可以在被盗终端 更换 SIM卡或者 SIM卡弃用或者停机的情况下应用, 由于更换 SIM卡, 根 据无线机器管理协议 ( Wireless Machine Management Protocol, 简称为 WMMP ) 协议, 将拒绝该 M2M终端接入系统, 这样 M2M终端在不需要借 助其他的外界设备就达到了被盗处理的目的。 优选地, 用于追踪 M2M终端的信息可以为通过 GPS芯片釆集的 M2M 终端的位置信息。 通过 GPS获得的数据比较精确, 当然通过用于追踪 M2M 终端的信息也可以是另外的方式, 例如, M2M终端可以进行拍照以记录信 息等。 当然, 为了更加安全, 用于指示 M2M终端已经被盗的信息为防盗密钥, 其中, 防盗密钥是 M2M终端与 M2M平台在合法接入时十办商好的并用于证 明 M2M终端身份的安全码。 本实施例还提供了一种 M2M终端被盗处理方法, 图 2是根据本发明实 施例的 M2M终端被盗处理方法的流程图二, 如图 2所示, 该流程包括如下 步骤: 步骤 S202, M2M平台接收来自 M2M终端发送的用于指示 M2M终端已 经被盗的信息和用于追踪 M2M终端的信息; 步骤 S204 , M2M平台确定 M2M终端被盗。 该流程是从 M2M平台的角度进行的说明, 其他的在上述已经进行过说 明的在此不再赘述。 本实施例还提供了一种被盗处理装置, 该装置位于 M2M终端中, 该装 置用于实现上述实施例及其优选实施方式,已经进行过说明的在此不再赘述, 下面对该装置中涉及到的模块进行说明。 图 3是根据本发明实施例的被盗处 理装置的结构框图一, 如图 3所示, 该装置包括: 确定模块 32、 处理模块 34, 下面对该结构进行说明。 确定模块 32 , 设置为确定 M2M终端被盗; 处理模块 34连接至确定模 块 32, 该模块设置为对 M2M终端进行被盗处理, 其中, 被盗处理包括以下 至少之一: 向 M2M平台发送用于指示 M2M终端已经被盗的信息和用于追 踪 M2M终端的信息、 拨打报警号码并播报所述用于追踪 M2M终端的信息。 本实施例还提供了一种被盗处理装置, 该装置位于 M2M平台中, 该装 置用于实现上述实施例及其优选实施方式,已经进行过说明的在此不再赘述, 下面对该装置中涉及到的模块进行说明。 图 4是根据本发明实施例的被盗处 理装置的结构框图二, 如图 4所示, 该结构包括: 接收模块 42、 确定模块 44, 下面对该结构进行说明。 接收模块 42, 设置为接收来自 M2M终端发送的用于指示 M2M终端已 经被盗的信息和用于追踪 M2M终端的信息; 确定模块 44连接至接收模块 42, 该模块设置为确定 M2M终端被盗。 下面的一个优选实施例以 M2M终端被盗之后的不同 SIM卡处理情况为 例进行了说明。 本优选实施例,针对 M2M系统的安全防盗问题,利用 M2M终端和 M2M 平台 (或称为 M2M控制台) 之间的 WMMP数据联系, 判断被盗条件, 根 据条件将设备转移后的关键信息 (例如 GPS位置、 新的 SIM卡号码、 安全 密钥等)用 WMMP 4艮文传送给 M2M平台。 同时考虑窃者可能弃用 SIM卡, 只使用行业应用固有功能这一特殊情况, 提出了一种自动拨打紧急呼叫, 播 放固定格式语音的方法定位设备, 为 M2M终端防盗提供了一种比较可靠的 方法。 对于被盗设备可能存在三种情况: 暂时不更换 SIM卡、 更换 SIM卡、 弃用 SIM卡。 每种情况受条件限制实现细节不同, 但其处理流程均可以包括 如下步 4聚: A.设备上电, 自动注册、 连接数据业务并尝试连接 M2M平台; B.接收防盗~¾文、 更新防盗参数; C.定时查询防盗参数, 判断是否被盗; D. 若判断设备被盗, 启用防盗措施。 下面对此进行说明。 步骤 A: 当 M2M终端上电, 将自动注册和连接数据业务, 当数据业务 连接成功, 则终端会主动发起和 M2M平台的链接。 当步 4聚 A执行成功且防 盗功能启用时, 防盗逻辑执行步骤 B, 否则直接执行步骤 C。 步骤 B: M2M终端和平台之间进行 WMMP数据交互的过程中, 防盗逻 辑在每一次正常数据交互后将更新一个变量, 该变量在本实施例中称为防盗 参数, 例如, 可以是整数递增的。 该参数是用来判断在一定时间内终端是否 成功和平台交互的依据。同时,在某些特殊情况下,例如被盗设备不更换 SIM 卡时, M2M平台通过手动或自动方式得知终端被盗, 将通过向被盗终端发 送防盗报文, 主动获取被盗设备的位置等信息, 这种情况下, 直接执行步骤 D。 步骤 C: 除了上一步所述的, M2M平台主动下发防盗 4艮文, 且终端成功 接收的情况以外, 都需要执行本步骤。 防盗逻辑在终端设备上电以后将启动 一个定时器, 在一定时间间隔内, 定时器会启动查询防盗参数是否被更新, 如果连续几次 (例如, 三次) 发现防盗参数没有被更新则判定为设备被盗, 执行步骤 D。 步骤 D: 启用防盗措施, 由于不同情况下 M2M终端的通讯条件不同, 因此发送防盗信息的方式也有所区别。 当 SIM卡不更换时, 终端直接获取 GPS模块获得的位置信息, 以 WMMP报文的形式发送给 M2M平台, 并且 当位置信息发生改变将自动重发; 当窃者更换 SIM卡, 根据 WMMP协议, 如果安全参数不合法, M2M平台端会拒绝该终端接入系统, 该方式同样釆 用步骤 C的方法即可判断是否被盗, 如果被盗, 将釆用预设的防盗密钥, 结 合获取的 GPS位置信息,组成防盗 4艮文发送给 M2M平台进行处理;如果 SIM 卡被弃用或者欠费停机, 根据步骤 C的逻辑得出被盗结论, M2M终端获取 GPS信息, 结合预设的语音模板进行组合, 自动拨打紧急号码报警。 通过本优选实施例, 利用 M2M现有的业务流程, 针对 M2M终端无人 值守这一安全漏洞, 提出了一种简单可行的防盗方法。 同时考虑了 SIM卡常 用服务不可用这一特殊情况, 釆取了自动拨打紧急号码, 播放组合语音的方 式, 改进了防盗措施, 使防盗方案更加切实可靠。 下面结合附图进行说明。 当被盗终端被转移并且尚未更换 SIM卡的情况下,无论终端是否重新上 电, 将继续和 M2M平台之间进行数据通信。 这种情况下, 终端设备被盗是 由 M2M平台首先发现的, 比如传回的数据严重异常, 或者人工发现设备不 见了, 此时 M2M平台会向 M2M终端发送具有防盗安全指令的报文。 然后, 终端解析该报文, 将会按照指示回复相应的信息给平台, 例如: 从 GPS模块 获取当前位置参数。 平台获得了这些信息就能够釆取相应的措施。 图 5是根 据本发明实施例的不更换 SIM卡情况下被盗处理的流程图, 如图 5所示, 该 流程图包括如下步骤: 步骤 S502, M2M终端设备上电、 连接到 M2M平台, 将继续和 M2M平 台之间进行数据通信; 步骤 S504 , M2M平台端发现终端可能被盗, 如果判断 M2M终端被盗, 则进入步骤 S 506; 步骤 S506 , M2M平台发送防盗 4艮文给 M2M终端, 要求获取位置等信 息; 步骤 S508, M2M终端解析防盗 4艮文, 获取当前位置信息发送 WMMP 4艮文给 M2M平台; 步骤 S510, M2M平台根据位置信息决定是否报警处理。 如果盗窃者更换了 M2M终端设备中的 SIM卡, 平台无法釆用原来的数 据连接找到 M2M终端, 这时流程稍有不同, 图 6是才艮据本发明实施例的更 换 SIM卡情况下被盗处理的流程图, 如图 6所示, 该流程包括如下步骤: 步骤 S602, 为更换 SIM卡以后, 终端会自动注册并连接数据业务, 如 果成功则进入步骤 S604; 步骤 S604, 终端按照原有的参数, 尝试连接 M2M平台, 对于通常更换 SIM卡的情况,平台和终端之间都有协商策略,如果没有特殊处理,更换 SIM 卡后尝试的链接将会被拒绝不予理睬, 进入步骤 S606; 步骤 S606 , 终端的防盗逻辑在一定时间会启动检查防盗参数的机制, 这 里主要是判断防盗参数是否被更新, 防盗参数更新的条件是和平台间正常的 进行数据交互; 步骤 S608, 如果检查几次发现安全参数没有被更新, 说明长时间和平台 无联系, 防盗逻辑将检查自身的网络状态,如果网络正常,将进入步骤 S610; 步骤 S610,发送包含安全密钥及 GPS位置参数的防盗报文给 M2M平台, M2M平台识别出防盗密钥, 提取出位置信息进行处理。 这里的安全密钥是 终端和 M2M平台在之前合法接入时十办商好的密码, 用来证明终端身份的安 全码。 由于 M2M终端是由行业应用设备及支持 M2M的通讯模块集成而来, 这种特殊性决定了盗窃者可能注重的是行业应用设备本身的价值, 而不使用 SIM卡, 在这种特殊情况下釆用本发明的防盗逻辑, 仍然可以发挥作用。 图 7是才艮据本发明实施例的无 SIM卡情况下被盗处理的流程图, 如图 7所示, 该流程包括如下步骤: 步骤 S702, 当 SIM卡被拔出, 终端将尝试自动注册和连接数据业务; 步骤 S704, 终端自动注册和连接数据业务失败, 自然也无法连接 M2M 平台; 步骤 S706, 防盗主控器定时启动, 查询防盗参数是否被更新; 步骤 S708, 基于上一步的结论, 如果连续几次查询结果都异常, 则判断 该设备被盗, 且当前网络不可用, 进入特殊的报警模式; 步骤 S710 , 获取遗失设备当前的关键信息, 例如从 GPS模块获得当前 位置, 发送给语音报警模块进行报警语音重组; 步骤 S712, 根据预设的语音模板, 结合当前的 GPS信息重组新的报警 语音, 例如: "XX公司, 联系电话: xxxxxx, 设备 XX被盗, 当前 GPS位置 为: xxxxxx"; 步骤 S714 , 当报警语音合成以后, 语音报警模块将自动拨打紧急号码报 警, 当截获到电话接通的消息后, 自动播放语音报警。 图 8是根据本发明实施例所釆用的 M2M终端中的模块及各模块之间业 务相互关系的示意图。 如图 8所示, 该 M2M终端包括: 防盗信息处理模块 (用于实现确定模块 32的功能)、 防盗主控模块、 GPS信息模块、 语音报警 模块(防盗主控模块、 GPS信息模块和语音报警模块用于实现上述处理模块 34的功能), 下面对 j¾进行说明。 防盗信息处理模块, 负责接收和发送防盗 4艮文, 以及防盗参数的更新; 防盗主控模块, 负责定时查询防盗参数, 判断被盗条件、 以及组织 GPS及语 音报警模块; GPS信息模块, 用来从 GPS芯片釆集位置信息, 提供给防盗主 控模块及语音报警模块进行处理;语音报警模块,根据预设的语音模板和 GPS 信息组织语音片段, 同时负责紧急号码的呼叫功能, 当电话接通以后自动播 放语音片段报警。 如图 8所示, 各模块间的业务交互关系为: D1为 M2M平台和防盗信息 处理模块间的交互, 主要作用为接收并解析 M2M平台下发的防盗报文, 以 及才艮据平台和终端之间的成功数据交互来更新防盗参数; D2为防盗信息处理 模块和防盗主控模块之间的交互, 一方面防盗信息处理模块将平台下发的防 盗信息请求传递给主控模块, 另一方面主控模块查询防盗参数、 回复 M2M 平台请求的报文内容; D3为主控模块和语音报警模块之间的交互, 当 SIM 卡缺失或服务不可用的情况下, 主控模块下达任务给紧急语音模块启动紧急 语音流程; D4为主控模块和 GPS信息模块间的交互,主要当 SIM卡存在时, 主控模块从 GPS模块中获取当前的位置信息, 以 WMMP报文的方式发送给 平台; D5为 GPS模块和语音报警模块的交互, 参考 D3 , 当紧急语音流程启 动后, 语音报警模块将从 GPS模块中获取当前位置信息进行语音片段组合。 综上所述, 通过以上实施例, 解决了相关技术中没有对 M2M终端进行 处理的问题, 进而提高了 M2M终端的安全性。 显然, 本领域的技术人员应该明白, 上述的本发明的各模块或各步骤可 以用通用的计算装置来实现, 它们可以集中在单个的计算装置上, 或者分布 在多个计算装置所组成的网络上, 可选地, 它们可以用计算装置可执行的程 序代码来实现, 从而可以将它们存储在存储装置中由计算装置来执行, 或者 将它们分别制作成各个集成电路模块, 或者将它们中的多个模块或步骤制作 成单个集成电路模块来实现。 这样, 本发明不限制于任何特定的硬件和软件 结合。 以上所述仅为本发明的优选实施例而已, 并不用于限制本发明, 对于本 领域的技术人员来说, 本发明可以有各种更改和变化。 凡在本发明的^"神和 原则之内, 所作的任何修改、 等同替换、 改进等, 均应包含在本发明的保护 范围之内。BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to the field of communications, and in particular to a method and apparatus for stolen processing. BACKGROUND OF THE INVENTION Machine-to-machine (M2M) applications are increasingly widespread. Modules supporting M2M communication protocols and industrial application devices form an integrated M2M terminal. These terminals perform data through wireless networks and M2M platforms and other M2M terminals. Communication, in order to achieve almost no manual intervention to complete data collection, information sharing, macro-control and other functions. However, since most of the terminals are unattended, and JM艮 terminals are distributed in indoor and outdoor places, for some industrial applications with certain economic value, such as sensors, LCD screens, high-end 4 Nie heads, security anti-theft It is a problem that cannot be ignored. Currently, in the related art, there is no anti-theft processing for the M2M terminal. SUMMARY OF THE INVENTION A primary object of the present invention is to provide a method and apparatus for stolen processing to at least solve the above problems. According to an aspect of the present invention, a method for stolen processing is provided, including: a machine-to-machine M2M terminal determining that it is stolen; the M2M terminal performing a theft process, wherein the stolen processing includes at least the following A: sending information indicating that the M2M terminal has been stolen and information for tracking the M2M terminal to the M2M platform, dialing an alarm number, and broadcasting the information for tracking the M2M terminal. Preferably, the M2M terminal determines that the theft is included: the M2M terminal receives a message sent by the M2M platform to indicate that the M2M terminal has been stolen. Preferably, the M2M terminal determines that the theft is included: the M2M terminal establishes a connection with the M2M platform, and after performing a normal data interaction with the M2M platform, updating an anti-theft parameter; the M2M terminal querying the location Whether the anti-theft parameter is updated, and if it is found that the anti-theft parameter has not been updated for a predetermined period of time and/or the number of times the anti-theft parameter has not been updated reaches a threshold, it is determined that the M2M terminal is stolen. Preferably, the information for tracking the M2M terminal is location information of the M2M terminal that is collected by a GPS chip. Preferably, the information used to indicate that the M2M terminal has been stolen is an anti-theft key, wherein the anti-theft key is negotiated by the M2M terminal and the M2M platform during legal access and used for proof The security code of the M2M terminal identity. According to another aspect of the present invention, a method for stolen processing is provided, including: receiving, by an M2M platform, information sent by the M2M terminal to indicate that the M2M terminal has been stolen and for tracking the M2M terminal Information; the M2M platform determines that the M2M terminal is stolen. Preferably, the method further includes: the M2M platform sending a message to the M2M terminal to indicate that the M2M terminal has been stolen. Preferably, before the sending, by the M2M platform, the message indicating that the M2M terminal has been stolen, the method further includes: determining, by the M2M platform, that the data sent by the M2M terminal is abnormal, determining the M2M terminal Stolen; or, the M2M platform receives a command to send the message indicating that the M2M terminal has been stolen to the M2M terminal. According to an aspect of the present invention, there is also provided a stolen processing device, located in an M2M terminal, comprising: a determining module configured to determine that the M2M terminal is stolen; and a processing module configured to stolen the M2M terminal Processing, wherein the stolen processing includes at least one of: sending, to the M2M platform, information indicating that the M2M terminal has been stolen, information for tracking the M2M terminal, dialing an alarm number, and broadcasting the use Tracking information of the M2M terminal. According to another aspect of the present invention, there is also provided a stolen processing device, located in an M2M platform, comprising: a receiving module, configured to receive information sent from an M2M terminal for indicating that the M2M terminal has been stolen, and For tracking information of the M2M terminal; determining a module, configured to determine that the M2M terminal is stolen. Through the invention, the M2M terminal is used to determine that it is stolen; the M2M terminal performs the stolen processing, wherein the stolen processing includes at least one of the following: sending information indicating that the M2M terminal has been stolen to the M2M platform and for tracking the M2M The information of the terminal, dial the alarm number and broadcast the information used to track the M2M terminal. The problem that the M2M terminal is not processed in the related art is solved, thereby improving the security of the M2M terminal. BRIEF DESCRIPTION OF THE DRAWINGS The accompanying drawings, which are set to illustrate,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, 1 is a flow chart 1 of a method for handling theft of an M2M terminal according to an embodiment of the present invention; FIG. 2 is a second flowchart of a method for handling theft of an M2M terminal according to an embodiment of the present invention; FIG. 4 is a block diagram of a structure of a stolen processing apparatus according to an embodiment of the present invention; FIG. 5 is a stolen case without changing a SIM card according to an embodiment of the present invention; FIG. 6 is a flowchart of the stolen processing in the case of replacing the SIM card according to the embodiment of the present invention; FIG. 7 is a flowchart of the stolen processing in the case of no SIM card according to the embodiment of the present invention; FIG. 8 is a schematic diagram of a module in an M2M terminal and a service relationship between modules according to an embodiment of the present invention. BEST MODE FOR CARRYING OUT THE INVENTION Hereinafter, the present invention will be described in detail with reference to the accompanying drawings. It should be noted that the embodiments in the present application and the features in the embodiments may be combined with each other without conflict. In this embodiment, a method for processing aft of an M2M terminal is provided. FIG. 1 is a flowchart 1 of a method for processing aft of an M2M terminal according to an embodiment of the present invention. As shown in FIG. 1, the process includes the following steps: Step 4: S2, the M2M terminal determines that it is stolen; Step 4 gathers S104, and the M2M terminal performs the theft process, where the theft process may include at least one of the following: sending to the M2M platform, indicating that the M2M terminal has been The stolen information and information used to track the M2M terminal, dial the alarm number and broadcast the information used to track the M2M terminal. After the above steps are taken, the M2M terminal can perform related processing after determining that it is stolen. Of course, if the M2M terminal can communicate with the M2M platform, it can send to the M2M platform. Information used to track M2M terminals. Of course, at the same time, the M2M terminal can dial the alarm number. This makes the M2M theft process more complete. If only one processing method is performed, the processing problem after the M2M terminal is stolen can also be solved at this time. For example, the M2M can select different processing methods according to the communication conditions after the theft. Preferably, in the implementation, the M2M terminal determines that there are multiple ways to steal the data. The following is exemplified by the following: For example, the M2M platform may be determined by the M2M platform to be stolen. After the M2M platform determines that the M2M terminal is stolen, A message for indicating that the M2M terminal has been stolen is sent to the M2M terminal, and then the M2M terminal receives a message sent by the M2M platform to indicate that the M2M terminal has been stolen. In this way, the stolen terminal can be applied without replacing the SIM card. Since the SIM card is not replaced, the terminal will continue to interact with the M2M platform, and the M2M platform directly sends the message to the terminal. The M2M platform may determine that the M2M terminal is stolen in the case that the data sent by the M2M terminal is abnormal. Alternatively, the M2M platform may receive a command to send a message to the M2M terminal indicating that the M2M terminal has been stolen. The command may be sent by the administrator or other monitoring device to the M2M platform after the M2M terminal is stolen. For example, it can be determined by the M2M terminal that it has been stolen. One of the preferred determining manners may be: the M2M terminal establishes a connection with the M2M platform, and after performing a normal data interaction with the M2M platform, the anti-theft parameter is updated; the M2M terminal queries whether the anti-theft parameter is updated, and the anti-theft is queried. The parameter determines that the M2M terminal is stolen if the predetermined duration is not updated and/or the number of times the burglary parameter has not been updated reaches the threshold. This processing method can be applied when the stolen terminal replaces the SIM card or the SIM card is abandoned or stopped. Since the SIM card is replaced, the M2M will be rejected according to the Wireless Machine Management Protocol (WMMP) protocol. The terminal accesses the system, so that the M2M terminal achieves the purpose of stolen processing without using other external devices. Preferably, the information used to track the M2M terminal may be location information of the M2M terminal that is collected by the GPS chip. The data obtained by GPS is relatively accurate. Of course, the information for tracking the M2M terminal can also be another way. For example, the M2M terminal can take photos to record information and the like. Of course, in order to be more secure, the information used to indicate that the M2M terminal has been stolen is an anti-theft key, wherein the anti-theft key is a security of the M2M terminal and the M2M platform when it is legally accessed and used to prove the identity of the M2M terminal. code. The embodiment also provides a method for processing the theft of the M2M terminal. FIG. 2 is a second flowchart of the method for the theft of the M2M terminal according to the embodiment of the present invention. As shown in FIG. 2, the process includes the following steps: Step S202: The M2M platform receives information sent from the M2M terminal to indicate that the M2M terminal has been stolen and information for tracking the M2M terminal. In step S204, the M2M platform determines that the M2M terminal is stolen. The process is described from the perspective of the M2M platform, and other details that have been described above are not described herein. The present embodiment further provides a stolen processing device, which is located in an M2M terminal, and is used to implement the above-mentioned embodiments and preferred embodiments thereof. The modules involved are explained. FIG. 3 is a block diagram of a structure of a stolen processing apparatus according to an embodiment of the present invention. As shown in FIG. 3, the apparatus includes: a determining module 32 and a processing module 34. The structure will be described below. The determining module 32 is configured to determine that the M2M terminal is stolen; the processing module 34 is coupled to the determining module 32, and the module is configured to perform the theft processing on the M2M terminal, where the stolen processing includes at least one of: sending to the M2M platform for Information indicating that the M2M terminal has been stolen and information for tracking the M2M terminal, dialing an alarm number, and broadcasting the information for tracking the M2M terminal. The embodiment also provides a stolen processing device, which is located in the M2M platform, and is used to implement the above-mentioned embodiments and preferred embodiments thereof. The modules involved are explained. 4 is a block diagram 2 of a structure of a stolen processing apparatus according to an embodiment of the present invention. As shown in FIG. 4, the structure includes: a receiving module 42 and a determining module 44. The structure will be described below. The receiving module 42 is configured to receive information sent from the M2M terminal for indicating that the M2M terminal has been stolen and information for tracking the M2M terminal; the determining module 44 is connected to the receiving module 42, and the module is configured to determine that the M2M terminal is stolen. The following preferred embodiment is described by taking the case of different SIM card processing after the M2M terminal is stolen. In the preferred embodiment, for the security anti-theft problem of the M2M system, the WMMP data connection between the M2M terminal and the M2M platform (or called the M2M console) is used to determine the stolen condition, and the root According to the conditions, the key information after the device transfer (such as GPS location, new SIM card number, security key, etc.) is transmitted to the M2M platform by WMMP 4. At the same time, considering that the thief may abandon the SIM card and use only the special function of the industry application inherent function, a method for automatically dialing an emergency call and playing a fixed format voice is proposed, which provides a relatively reliable method for the M2M terminal security. method. There are three possible situations for stolen devices: Temporarily do not replace the SIM card, replace the SIM card, or deprecate the SIM card. Each case is subject to different conditions and implementation details, but the processing flow can include the following steps: A. The device is powered on, automatically registered, connected to the data service and tries to connect to the M2M platform; B. Receive anti-theft ~3⁄4 text, update theft Parameters; C. Regularly query the anti-theft parameters to determine whether they are stolen; D. If the device is judged to be stolen, anti-theft measures are enabled. This will be explained below. Step A: When the M2M terminal is powered on, the data service will be automatically registered and connected. When the data service connection is successful, the terminal will initiate a link with the M2M platform. When step 4 is performed successfully and the anti-theft function is enabled, the anti-theft logic performs step B, otherwise step C is directly executed. Step B: During the WMMP data interaction between the M2M terminal and the platform, the antitheft logic will update a variable after each normal data interaction. This variable is referred to as an antitheft parameter in this embodiment. For example, it may be an integer increment. . This parameter is used to determine whether the terminal is successful and interacts with the platform within a certain period of time. At the same time, in some special cases, for example, when the stolen device does not replace the SIM card, the M2M platform learns that the terminal is stolen manually or automatically, and will send the burglaring message to the stolen terminal to actively obtain the location of the stolen device. Wait for the information, in this case, directly perform step D. Step C: In addition to the situation described in the previous step, the M2M platform actively sends out the anti-theft message, and the terminal needs to perform this step. The anti-theft logic will start a timer after the terminal device is powered on. During a certain time interval, the timer will start to query whether the anti-theft parameter is updated. If the anti-theft parameter is not updated several times (for example, three times), it is determined as the device. Stolen, perform step D. Step D: Enable anti-theft measures. Because the communication conditions of M2M terminals are different under different circumstances, the way to send anti-theft information is also different. When the SIM card is not replaced, the terminal directly obtains the location information obtained by the GPS module, and sends the information to the M2M platform in the form of a WMMP message, and automatically retransmits when the location information changes; when the thief replaces the SIM card, according to the WMMP protocol, If the security parameters are invalid, the M2M platform will refuse to access the system. This method can also be used to determine whether it is stolen. If it is stolen, the default anti-theft key will be used. The acquired GPS location information is sent to the M2M platform for processing; if the SIM card is abandoned or the arrears are down, the stolen conclusion is obtained according to the logic of step C, and the M2M terminal obtains the GPS information, combined with the preset The voice template is combined to automatically dial the emergency number alarm. Through the preferred embodiment, using the existing business process of M2M, a simple and feasible anti-theft method is proposed for the security vulnerability of the M2M terminal unattended. At the same time, considering the special case that the SIM card common service is not available, the method of automatically dialing the emergency number and playing the combined voice is taken, and the anti-theft measures are improved, so that the anti-theft scheme is more reliable and reliable. Description will be made below with reference to the drawings. When the stolen terminal is transferred and the SIM card has not been replaced, data communication between the terminal and the M2M platform will continue regardless of whether the terminal is powered back on. In this case, the termination of the terminal device is first discovered by the M2M platform. For example, the returned data is seriously abnormal, or the manually discovered device is missing. At this time, the M2M platform sends a message with an anti-theft security command to the M2M terminal. Then, the terminal parses the message, and will reply the corresponding information to the platform according to the instruction, for example: acquiring the current location parameter from the GPS module. Once the platform has obtained this information, it can take the appropriate measures. FIG. 5 is a flowchart of a stolen process in a case where a SIM card is not replaced according to an embodiment of the present invention. As shown in FIG. 5, the flowchart includes the following steps: Step S502, the M2M terminal device is powered on and connected to the M2M platform, and The data communication between the M2M platform and the M2M platform is continued; in step S504, the M2M platform detects that the terminal may be stolen. If it is determined that the M2M terminal is stolen, the process proceeds to step S506; and in step S506, the M2M platform sends the anti-theft message to the M2M terminal, requesting Obtaining information such as location; Step S508, the M2M terminal parses the anti-theft message, and obtains the current location information to send the WMMP message to the M2M platform; in step S510, the M2M platform determines whether to perform alarm processing according to the location information. If the thief replaces the SIM card in the M2M terminal device, the platform cannot find the M2M terminal by using the original data connection, and the flow is slightly different. FIG. 6 is stolen in the case of replacing the SIM card according to the embodiment of the present invention. The flow chart of processing, as shown in FIG. 6, the process includes the following steps: Step S602, after the SIM card is replaced, the terminal automatically registers and connects the data service. If yes, the process proceeds to step S604. In step S604, the terminal attempts to connect to the M2M platform according to the original parameters. For the case where the SIM card is normally replaced, the platform and There is a negotiation policy between the terminals. If there is no special processing, the link attempted after replacing the SIM card will be rejected, and the process proceeds to step S606; in step S606, the anti-theft logic of the terminal starts the mechanism for checking the anti-theft parameters at a certain time. Here, it is mainly to judge whether the anti-theft parameter is updated, and the condition for updating the anti-theft parameter is to perform normal data interaction with the platform; Step S608, if the security parameter is not updated after checking several times, indicating that the platform is not connected for a long time, the anti-theft logic will Checking the network status of the user, if the network is normal, the process proceeds to step S610; in step S610, the anti-theft message including the security key and the GPS location parameter is sent to the M2M platform, the M2M platform recognizes the anti-theft key, and extracts the location information for processing. The security key here is a password that is used by the terminal and the M2M platform to authenticate the terminal when it is legally accessed. Since the M2M terminal is integrated by industry application equipment and M2M-enabled communication modules, this particularity determines the value that the thief may focus on is the industry application device itself, without using a SIM card. In this special case釆With the antitheft logic of the present invention, it still functions. FIG. 7 is a flowchart of the stolen processing in the case of no SIM card according to the embodiment of the present invention. As shown in FIG. 7, the flow includes the following steps: Step S702, when the SIM card is pulled out, the terminal will attempt to automatically register. And connecting the data service; Step S704, the terminal automatically registers and connects to the data service fails, and naturally cannot connect to the M2M platform; Step S706, the anti-theft master controller starts periodically, and queries whether the anti-theft parameter is updated; Step S708, based on the conclusion of the previous step, If the query result is abnormal for several consecutive times, it is judged that the device is stolen, and the current network is unavailable, and enters a special alarm mode; Step S710, obtaining current key information of the lost device, for example, obtaining the current location from the GPS module, and transmitting the voice to the voice The alarm module performs alarm voice reorganization; Step S712, according to the preset voice template, recombining the new alarm voice with the current GPS information, for example: "XX company, contact telephone number: xxxxxx, device XX is stolen, current GPS location is: xxxxxx"; Step S714, when alarm After the speech synthesis, the voice alarm module will automatically dial the emergency number alarm, and when the message of the call is intercepted, the voice alarm will be automatically played. FIG. 8 is a schematic diagram of modules in a M2M terminal and a service relationship between modules according to an embodiment of the present invention. As shown in FIG. 8, the M2M terminal includes: an anti-theft information processing module (for implementing the function of the determining module 32), an anti-theft main control module, a GPS information module, a voice alarm module (an anti-theft main control module, a GPS information module, and a voice alarm). The module is used to implement the functions of the processing module 34 described above. The following describes j3⁄4. The anti-theft information processing module is responsible for receiving and transmitting the anti-theft alarm and the anti-theft parameter update; the anti-theft main control module is responsible for regularly querying the anti-theft parameters, judging the stolen conditions, and organizing the GPS and voice alarm module; the GPS information module is used The location information is collected from the GPS chip and provided to the anti-theft main control module and the voice alarm module for processing; the voice alarm module organizes the voice segment according to the preset voice template and GPS information, and is also responsible for the call function of the emergency number, when the call is connected The voice clip alarm is automatically played later. As shown in Figure 8, the service interaction relationship between the modules is as follows: D1 is the interaction between the M2M platform and the anti-theft information processing module. The main function is to receive and parse the anti-theft message sent by the M2M platform, and to view the platform and the terminal. The successful data interaction between the two to update the anti-theft parameters; D2 is the interaction between the anti-theft information processing module and the anti-theft main control module, on the one hand, the anti-theft information processing module transmits the anti-theft information request sent by the platform to the main control module, on the other hand The main control module queries the anti-theft parameter and replies to the message content requested by the M2M platform; D3 interacts between the main control module and the voice alarm module. When the SIM card is missing or the service is unavailable, the main control module issues a task to the emergency voice. The module initiates an emergency voice process; D4 interacts between the main control module and the GPS information module, mainly when the SIM card exists, the main control module obtains the current location information from the GPS module, and sends the information to the platform in the manner of WMMP message; D5 For the interaction between the GPS module and the voice alarm module, refer to D3. When the emergency voice process is started, the voice alarm module will be obtained from the GPS module. The current speech segment combinations of location information. In summary, the above embodiments solve the problem that the M2M terminal is not processed in the related art, thereby improving the security of the M2M terminal. Obviously, those skilled in the art should understand that the above modules or steps of the present invention can be implemented by a general-purpose computing device, which can be concentrated on a single computing device or distributed over a network composed of multiple computing devices. Alternatively, they may be implemented by program code executable by the computing device so that they may be stored in the storage device by the computing device, or they may be separately fabricated into individual integrated circuit modules, or Multiple modules or steps are made into a single integrated circuit module. Thus, the invention is not limited to any specific combination of hardware and software. The above is only the preferred embodiment of the present invention, and is not intended to limit the present invention, and various modifications and changes can be made to the present invention. Any modifications, equivalent substitutions, improvements, etc. made within the scope of the present invention are intended to be included within the scope of the present invention.

Claims

权 利 要 求 书 Claim
1. 一种被盗处理方法, 包括:1. A method of stolen processing, including:
机器对机器 M2M终端确定其被盗; Machine-to-machine M2M terminal determines that it has been stolen;
所述 M2M终端进行被盗处理, 其中, 所述被盗处理包括以下至 少之一:向 M2M平台发送用于指示所述 M2M终端已经被盗的信息和 用于追踪所述 M2M终端的信息、 拨打报警号码并播报所述用于追踪 所述 M2M终端的信息。 The M2M terminal performs the stolen processing, where the stolen processing includes at least one of: transmitting, to the M2M platform, information indicating that the M2M terminal has been stolen, and information for tracking the M2M terminal, dialing The alarm number and the information used to track the M2M terminal are broadcast.
2. 根据权利要求 1所述的方法, 其中, 所述 M2M终端确定其被盗包括: 所述 M2M终端接收到所述 M2M平台发送的用于指示所述 M2M 终端已经被盗的消息。The method according to claim 1, wherein the M2M terminal determines that the theft is included: the M2M terminal receives a message sent by the M2M platform to indicate that the M2M terminal has been stolen.
3. 根据权利要求 1所述的方法, 其中, 所述 M2M终端确定其被盗包括: 所述 M2M终端与所述 M2M平台建立连接, 并在与所述 M2M平 台进行一次正常的数据交互之后, 更新防盗参数;3. The method according to claim 1, wherein the M2M terminal determines that the theft is included: the M2M terminal establishes a connection with the M2M platform, and after performing a normal data interaction with the M2M platform, Update the anti-theft parameters;
所述 M2M终端查询所述防盗参数是否被更新, 并在查询到所述 防盗参数在预定时长未被更新和 /或查询到所述防盗参数未被更新的 次数到达阈值的情况下, 确定所述 M2M终端被盗。 Determining, by the M2M terminal, whether the anti-theft parameter is updated, and determining that the anti-theft parameter has not been updated for a predetermined period of time and/or the number of times the anti-theft parameter has not been updated reaches a threshold value, The M2M terminal was stolen.
4. 根据权利要求 1所述的方法, 其中, 所述用于追踪所述 M2M终端的 信息为通过 GPS芯片釆集的所述 M2M终端的位置信息。The method according to claim 1, wherein the information for tracking the M2M terminal is location information of the M2M terminal that is collected by a GPS chip.
5. 根据权利要求 1所述的方法, 其中, 所述用于指示所述 M2M终端已 经被盗的信息为防盗密钥, 其中, 所述防盗密钥是所述 M2M终端与 所述 M2M平台在合法接入时协商好的并用于证明所述 M2M终端身份 的安全码。The method according to claim 1, wherein the information indicating that the M2M terminal has been stolen is an anti-theft key, wherein the anti-theft key is that the M2M terminal and the M2M platform are A security code negotiated at the time of legal access and used to prove the identity of the M2M terminal.
6. —种被盗处理方法, 包括:6. A method of stolen handling, including:
M2M平台接收来自所述 M2M终端发送的用于指示所述 M2M终 端已经被盗的信息和用于追踪所述 M2M终端的信息; The M2M platform receives information sent by the M2M terminal to indicate that the M2M terminal has been stolen and information for tracking the M2M terminal;
所述 M2M平台确定所述 M2M终端被盗。The M2M platform determines that the M2M terminal is stolen.
7. 根据权利要求 6所述的方法, 其中, 还包括:7. The method according to claim 6, further comprising:
所述 M2M平台向所述 M2M终端发送用于指示所述 M2M终端已 经被盗的消息。 The M2M platform sends a message to the M2M terminal to indicate that the M2M terminal has been stolen.
8. 根据权利要求 7所述的方法, 其中, 在所述 M2M平台发送所述用于 指示所述 M2M终端已经被盗的消息之前, 还包括:The method according to claim 7, wherein before the sending, by the M2M platform, the message indicating that the M2M terminal has been stolen, the method further includes:
所述 M2M平台在所述 M2M终端发送的数据异常的情况下,确定 所述 M2M终端被盗; 或者, The M2M platform determines that the M2M terminal is stolen if the data sent by the M2M terminal is abnormal; or
所述 M2M平台接收到向所述 M2M终端发送所述用于指示所述 M2M终端已经被盗的消息的命令。 The M2M platform receives a command to send the message to the M2M terminal to indicate that the M2M terminal has been stolen.
9. 一种被盗处理装置, 位于 M2M终端中, 包括:9. A stolen processing device, located in an M2M terminal, comprising:
确定模块, 设置为确定所述 M2M终端被盗; Determining a module, configured to determine that the M2M terminal is stolen;
处理模块, 设置为对所述 M2M终端进行被盗处理, 其中, 所述 被盗处理包括以下至少之一:向 M2M平台发送用于指示所述 M2M终 端已经被盗的信息和用于追踪所述 M2M终端的信息、 拨打报警号码 并播 4艮所述用于追踪所述 M2M终端的信息。 a processing module, configured to perform the theft processing on the M2M terminal, where the stolen processing includes at least one of: transmitting, to the M2M platform, information indicating that the M2M terminal has been stolen and for tracking the The information of the M2M terminal, dialing the alarm number, and broadcasting the information for tracking the M2M terminal.
10. —种被盗处理装置, 位于 M2M平台中, 包括:10. A stolen processing device, located in the M2M platform, including:
接收模块,设置为接收来自 M2M终端发送的用于指示 M2M终端 已经被盗的信息和用于追踪 M2M终端的信息; a receiving module, configured to receive information sent by the M2M terminal to indicate that the M2M terminal has been stolen and information for tracking the M2M terminal;
确定模块, 设置为确定 M2M终端被盗。 Determine the module, set to determine that the M2M terminal is stolen.
PCT/CN2011/0714912011-01-072011-03-03Theft processing method and apparatusWO2012092723A1 (en)

Applications Claiming Priority (2)

Application NumberPriority DateFiling DateTitle
CN2011100027693ACN102104697A (en)2011-01-072011-01-07Stealing processing method and device
CN201110002769.32011-01-07

Publications (1)

Publication NumberPublication Date
WO2012092723A1true WO2012092723A1 (en)2012-07-12

Family

ID=44157201

Family Applications (1)

Application NumberTitlePriority DateFiling Date
PCT/CN2011/071491WO2012092723A1 (en)2011-01-072011-03-03Theft processing method and apparatus

Country Status (2)

CountryLink
CN (1)CN102104697A (en)
WO (1)WO2012092723A1 (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN104080060B (en)*2013-03-252018-06-22展讯通信(上海)有限公司The method that mobile terminal sends antitheft short message
CN105979491A (en)*2016-05-092016-09-28北京邮电大学SIM card remote control method, intelligent terminal and server
CN107547486A (en)*2016-06-282018-01-05深圳市中兴微电子技术有限公司A kind of network equipment personal identification method and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20050149752A1 (en)*2003-12-292005-07-07Johnson Robert K.System and method for tracking laptop computers
CN1859670A (en)*2005-09-212006-11-08华为技术有限公司Mobile terminal with anti-theft function and anti-theft method for mobile terminal
CN1992762A (en)*2005-12-292007-07-04腾讯科技(深圳)有限公司Anti-theft method for handset
CN101340638A (en)*2008-08-122009-01-07青岛海信移动通信技术股份有限公司Alarm control method of mobile communication apparatus and mobile communication apparatus

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN1848891B (en)*2006-04-052010-12-08中国移动通信集团公司 Method for Network Detecting Anti-theft Terminal Status

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20050149752A1 (en)*2003-12-292005-07-07Johnson Robert K.System and method for tracking laptop computers
CN1859670A (en)*2005-09-212006-11-08华为技术有限公司Mobile terminal with anti-theft function and anti-theft method for mobile terminal
CN1992762A (en)*2005-12-292007-07-04腾讯科技(深圳)有限公司Anti-theft method for handset
CN101340638A (en)*2008-08-122009-01-07青岛海信移动通信技术股份有限公司Alarm control method of mobile communication apparatus and mobile communication apparatus

Also Published As

Publication numberPublication date
CN102104697A (en)2011-06-22

Similar Documents

PublicationPublication DateTitle
CN102932785B (en)Rapid authentication method, system and equipment of wireless local area network
US8023944B2 (en)Apparatus and method for performing attach procedure in mobile communication system
CN108833122A (en)Awakening method, device and the storage medium of vehicle-carrying communication controller
KR20160114620A (en)Methods, devices and systems for dynamic network access administration
WO2015131689A1 (en)Sensor code-pairing processing method, apparatus, network platform device, and internet of things gateway
WO2013067772A1 (en)Method, device and system for binding mtc device and uicc
CN113873491B (en) Communication device, system and computer readable storage medium
CN104980448B (en) A remote monitoring method, device and system
US8958792B2 (en)Method and system for selecting mobility management entity of terminal group
CN103973908B (en)Method and system for setting call forwarding
CN107396283A (en)A kind of router wireless connection authentication method and system
JP2007267315A (en)Multiple-authentication function switching apparatus
WO2013174349A2 (en)M2m gateway device and applying method thereof
WO2012092723A1 (en)Theft processing method and apparatus
CN101568116B (en)Method for obtaining certificate state information and certificate state management system
WO2008091133A1 (en)Method for re-enabling a disabled capability of a terminal and a device management system for the same
CN114036576A (en)Method and device for recovering ipsec tunnel and readable storage medium
CN103152721A (en)Terminal, mobility management entity, system and network access method
EP2891299B1 (en)Systems and methods for efficient remote security panel configuration and management
WO2008037174A1 (en)A method, device and communication system thereof of electing local master
JP5534473B2 (en) Internet connection authentication system, Internet connection authentication method and program
KR20150054359A (en)Remote control method for vehicle using telematics and smart device
JP4796924B2 (en) Button phone system
US7756083B2 (en)Network access device, network connection establishing method, and mobile communication system using the same
CN118250090B (en) Internet of Things Platform Information Processing Method and Device

Legal Events

DateCodeTitleDescription
121Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number:11855138

Country of ref document:EP

Kind code of ref document:A1

NENPNon-entry into the national phase

Ref country code:DE

122Ep: pct application non-entry in european phase

Ref document number:11855138

Country of ref document:EP

Kind code of ref document:A1


[8]ページ先頭

©2009-2025 Movatter.jp