Method and device for processing stolen terminal
First Claim
1. A method for processing a stolen terminal, comprising:
- receiving a state modification message from a sending party, wherein the state modification message carries a current state of the terminal; and
when the state modification message is legal, obtaining identity identification information of the terminal, and forwarding the state modification message carrying the identity identification information to a server, so that the server modifies a state information of the terminal stored in the server to be the current state according to the state modification message carrying the identity identification information, wherein the identity identification information comprises a hardware identification (ID) of the terminal, and the hardware ID is calculated according to the following steps;
obtaining an international mobile equipment identity (IMEI) of the terminal, which is denoted as a first character string;
obtaining a network card address of the terminal, wherein a character string left after non-letter and non-numeric characters in the network card address are removed is denoted as a second character string;
obtaining a serial number of a central processing unit (CPU) of the terminal, which is denoted as a third character string;
merging the first character string, the second character string and the third character string according to a predetermined order, and converting the merged character string into a capital format, which is denoted as a first result;
performing a Message Digest Algorithm (MD5) calculation on the first result, to obtain a second result; and
converting the second result into a capital format to obtain the hardware ID.
1 Assignment
0 Petitions
Accused Products
Abstract
The invention provides multiple methods and devices for processing a stolen terminal. Therein, a method for processing a stolen terminal comprises: receiving a state modification message from a sending party, wherein the state modification message carries the current state of the terminal; and in a case where the state modification message is legal, forwarding the state modification message to a server, so that the server modifies the state information of the terminal stored in the server to be the current state according to the state modification message. By employing embodiments of the invention, the state information of a terminal can be modified, which solves the problem in the prior art that other identification cannot be provided to indicate whether the terminal is stolen or not, and can achieve the beneficial effects of increasing the probability of recovering a stolen terminal and effectively curbing the stealing acts.
6 Citations
18 Claims
-
1. A method for processing a stolen terminal, comprising:
-
receiving a state modification message from a sending party, wherein the state modification message carries a current state of the terminal; and when the state modification message is legal, obtaining identity identification information of the terminal, and forwarding the state modification message carrying the identity identification information to a server, so that the server modifies a state information of the terminal stored in the server to be the current state according to the state modification message carrying the identity identification information, wherein the identity identification information comprises a hardware identification (ID) of the terminal, and the hardware ID is calculated according to the following steps; obtaining an international mobile equipment identity (IMEI) of the terminal, which is denoted as a first character string; obtaining a network card address of the terminal, wherein a character string left after non-letter and non-numeric characters in the network card address are removed is denoted as a second character string; obtaining a serial number of a central processing unit (CPU) of the terminal, which is denoted as a third character string; merging the first character string, the second character string and the third character string according to a predetermined order, and converting the merged character string into a capital format, which is denoted as a first result; performing a Message Digest Algorithm (MD5) calculation on the first result, to obtain a second result; and converting the second result into a capital format to obtain the hardware ID. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method for processing a stolen terminal, comprising:
-
receiving a state modification message from a sending party, wherein the state modification message carries identity identification information of a terminal of which a state has been changed; forwarding the state modification message to a terminal corresponding to the identity identification information of the terminal for verification by the terminal; and modifying a state information of the terminal according to a state modification request carrying a hardware identification (ID) of the terminal returned when the terminal verifies that the state modification message passes, wherein the hardware ID is calculated according to the following steps; obtaining an international mobile equipment identity (IMEI) of the terminal, which is denoted as a first character string; obtaining a network card address of the terminal, wherein a character string left after non-letter and non-numeric characters in the network card address are removed is denoted as a second character string; obtaining a serial number of a central processing unit (CPU) of the terminal, which is denoted as a third character string; merging the first character string, the second character string and the third character string according to a predetermined order, and converting the merged character string into a capital format, which is denoted as a first result; performing a Message Digest Algorithm (MD5) calculation on the first result, to obtain a second result; and converting the second result into a capital format to obtain the hardware ID. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14)
-
-
15. A method for processing a stolen terminal, comprising:
-
receiving a state modification message from a sending party, wherein the state modification message carries identity identification information of a terminal and a current state of the terminal; utilizing a server to perform legality verification on the state modification message; and modifying a state information of a terminal corresponding to the identity identification information to be the current state according to the state modification message which passes the legality verification, wherein the identity identification information comprises a hardware identification (ID) of the terminal, and the hardware ID is calculated according to the following steps; obtaining an international mobile equipment identity (IMEI) of the terminal, which is denoted as a first character string; obtaining a network card address of the terminal, wherein a character string left after non-letter and non-numeric characters in the network card address are removed is denoted as a second character string; obtaining a serial number of a central processing unit (CPU) of the terminal, which is denoted as a third character string; merging the first character string, the second character string and the third character string according to a predetermined order, and converting the merged character string into a capital format, which is denoted as a first result; performing a Message Digest Algorithm (MD5) calculation on the first result, to obtain a second result; and converting the second result into a capital format to obtain the hardware ID. - View Dependent Claims (16, 17, 18)
-
Specification