WO2013166886A1 - Anti-theft method, device and system for portable computer equipment - Google Patents
Anti-theft method, device and system for portable computer equipment Download PDFInfo
- Publication number
- WO2013166886A1 WO2013166886A1 PCT/CN2013/072986 CN2013072986W WO2013166886A1 WO 2013166886 A1 WO2013166886 A1 WO 2013166886A1 CN 2013072986 W CN2013072986 W CN 2013072986W WO 2013166886 A1 WO2013166886 A1 WO 2013166886A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- portable computer
- computer equipment
- server
- state
- mobile terminal
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/88—Detecting or preventing theft or loss
Definitions
- the present invention relates to anti-theft technology for computers, and more particularly to an anti-theft method, device and system for portable computer equipment.
- Ways in which the AT module chip determines whether the notebook computer is stolen mainly include following several types.
- the AT module chip can set displaying a login window before operation of a system, just like BIOS setting password.
- BIOS setting password When a number of attempts to enter a password exceeds a preset warning value, the system automatically shuts down and starts the anti-theft management measures.
- the ways 1 or 2 cannot trigger starting the anti-theft management measures until the notebook computer boots up for the next time.
- the user may have no other computer at hand when the user finds that the notebook computer has been stolen, and it will take a period of time before the user can use another computer to login page to trigger the anti-theft management measures. In this period of time, data in the stolen notebook computer may be leaked.
- the user logins the anti-theft management page the user not only needs to remember a website of the anti-theft management page, but also input information such as user name, password, etc. with the user's own memory.
- the existing anti-theft technology has following disadvantages: the user finds that the notebook computer has been stolen or may be in a state of being stolen, the user cannot quickly and easily start the anti-theft management measures in the first time.
- the present invention provides an anti-theft method, device and system for portable computer equipment, through which anti-theft management measures can be quickly and easily started in the first time after a notebook computer is stolen.
- An anti-theft method for portable computer equipment provided in one embodiment of the present invention, the method includes:
- step D after the server receives the anti-theft instruction, extracting, by the server, the identification information carried in the anti-theft instruction, and looking for information of the AT module chip which is bound with the identification information in the database; if the information of the AT module chip which is bound with the identification information is found in the database, then performing step D; otherwise, returning an error message to the mobile terminal and existing this process;
- [001 6] E. querying, by the portable computer equipment, the state of the AT module chip corresponding to the portable computer equipment in the server; if the state is missing state, then the AT module chip locks the portable computer equipment; if the state is normal state, then ending the process.
- the identification information of the mobile terminal comprises a user name and password, a mobile phone number, an international Mobile Equipment Identity (IMEI) number or an International Mobile Subscriber Identification (IMSI) number.
- the step B comprises:
- the method further comprises: setting an enabling recourse function identity in the recorded state information of the AT module chip;
- the step D comprises: determining, by the server, whether the state information of the AT module chip contains the enabling recourse function identity; if the state information of the AT module chip contains an enabling recourse function identity, then performing step F; otherwise, performing the step E;
- the method further comprises step F: querying, by the portable computer equipment, the state of the AT module chip corresponding to the portable computer equipment in the server; if the enabling recourse function is found, then implementing access restriction in software level to the portable computer equipment.
- the step F further comprises: establishing an instant communication connection between the portable computer equipment and the server.
- the step F further comprises:
- the method further comprises: sending, by the server, a lock instruction to the portable computer equipment; after the portable computer equipment receives the lock instruction, locking, by the AT module chip, the portable computer chip.
- the portable computer equipment is a notebook computer, a netbook or a tablet computer.
- Another embodiment of the present invention further provides an anti-theft AT system for portable computer equipment, the system includes:
- a mobile terminal to send an anti-theft instruction carrying identification information of a mobile terminal to a server at network side;
- the server to store the identification information of the mobile terminal which is bounded with information of an AT module chip of a portable computer equipment, in a database, and record a state of the AT module chip as normal state; after the server receives the anti-theft instruction from the mobile terminal, to extract the identification information carried in the anti-theft instruction and look for information of the AT module chip which is bound with the identification information of the mobile terminal in the database; if the information of the AT module chip which is bound with the identification information is found in the database, then to modify the state of the AT module chip from normal state to missing state; otherwise, to return an error message to the mobile terminal; and
- the portable computer equipment having the AT module chip to query the state of the AT module chip corresponding to the portable computer equipment in the server; if the state is missing state, then the AT module chip locks the portable computer equipment.
- Another embodiment of the present invention further provides a server for implementing anti-theft of portable computer equipment, the server includes:
- a database module to store identification information of a mobile terminal which is bounded with information of an AT module chip of a portable computer equipment
- a receiving module to receive an anti-theft instruction carrying the identification information of the mobile terminal from the mobile terminal;
- a query module to extract the identification information of the mobile terminal carried in the anti-theft instruction received from the receiving module and look for information of the AT module chip which is bound with the identification information of the mobile terminal stored in the database module; if the information of the AT module chip which is bound with the identification information is found, then to send the information of the AT module chip to a state management module;
- the state management module to store state information of the AT module chip; after receiving the information of the AT module chip from the query module, to modify the state of the corresponding AT module chip from normal state to missing state.
- the state management module further comprises:
- a recourse management unit to set enabling recourse function identity of the AT module chip.
- the server further comprises:
- an instant communication module to establish an instant communication connection with the portable computer equipment and make an instant communication with the portable computer equipment.
- the server further comprises:
- a remote control module to control the portable computer equipment to collect position information and receive the position information; and/or, to control the portable computer equipment to enable a front-facing camera of the portable computer equipment to video or take a photo and receive the video or photo.
- Fig. 1 is a flow chart of an anti-theft method for portable computer equipment provided in a first embodiment of the present invention.
- Fig. 2 is a flow chart of an anti-theft method for portable computer equipment provided in a second embodiment of the present invention.
- the basic idea of the present invention is: binding in advance hardware information of a mobile terminal of a user and a portable computer equipment of the user, and storing the binding information in a server at network side.
- the user finds that the portable computer equipment is stolen, the user can use the mobile terminal such a mobile phone to send an anti-theft instruction to the network side.
- the server After the server receives the anti-theft instruction and verifies that it is correct, the server triggers the portable computer equipment at an appropriate time to start the anti-theft management measures.
- the portable computer equipment includes but is not limited to a notebook computer, a netbook or a tablet computer.
- FIG. 1 A flow chart of an anti-theft method for portable computer equipment provided in a first embodiment of the present invention is shown in Fig. 1 , and the method includes following steps.
- Step 101 through a service registration process, binding identification information of a mobile terminal of a user and information of an AT module chip of a portable computer equipment of the user, storing the binding information in a database of a server at network side, and recording a state of the AT module chip as normal state.
- the identification information of a mobile terminal is to uniquely identify the mobile terminal.
- the identification information includes but is not limited to a mobile phone number, an international Mobile Equipment Identity (IMEI) number, an International Mobile Subscriber Identification (IMSI) number, a custom user name and password, and other information which has unique identification function, or any combination of the above content and variations thereof.
- the service registration process can be implemented by installing corresponding client software in the mobile terminal and direct communication with the network side.
- the service registration process can also be implemented by filling out registration information via a web page or through a mobile service hall.
- the AT module chip includes but is not limited to an anti-theft chip developed based on Intel's Anti-Theft technology.
- the use can bind the plurality of portable computer equipments with the same mobile terminal. But when an anti-theft instruction is sent in the following step, it needs to specify that the anti-theft instruction is for which of the plurality of portable computer equipments.
- Step 102 sending, by the user through the mobile terminal, an anti-theft instruction which carries the identification information of the mobile terminal to the server at the network side.
- the anti-theft instruction can be sent through the following way: the client software of the mobile terminal provides a virtual button of "sending anti-theft instruction" in a touch screen of the mobile terminal; after the user pushes the virtual button, the mobile terminal sends a packet, of which predefined content is an anti-theft instruction, to an address of the server.
- the user can be required to input verification codes, and the anti-theft instruction can be sent after it is verified that the verification codes are correct, thereby avoiding wrong operations or malicious operations of others.
- the sending process can use any conventional encryption.
- the anti-theft instruction can also be sent in a manner of sending a short message containing predefined strings to a specific service number, or making a voice call to operate according to prompts.
- Step 103 after the server receives the anti-theft instruction, extracting, by the server, the identification information carried in the anti-theft instruction, and looking for information of the AT module chip which is bound with the identification information in the database according to the identification information; if the information of the AT module chip which is bound with the identification information is found in the database, then performing step 104; otherwise, returning an error message to the mobile terminal and existing this process.
- Step 104 modifying, by the server, the recorded state of the AT module chip from normal state to missing state.
- Step 105 querying, by the portable computer equipment, the state of the AT module chip corresponding to the portable computer equipment in the server; if the state is missing state, then the AT module chip locks the portable computer equipment; if the state is normal state, then ending the process.
- the user may just want to temporarily lock the user's portable computer equipment so that other persons cannot use the user's portable computer equipment, and subsequently unlock.
- an access restriction function in software level can also be provided, so that the portable computer equipment can implement software access restrictions at an operating system level to the portable computer equipment so as to prohibit utilization of other programs, but the portable computer equipment is still in a state of capable of receiving instructions from the network side. If the portable computer equipment receives an unlock instruction, the portable computer equipment implements software unlock so that the portable computer equipment can be put back in use.
- a lock instruction can be sent from the network side to the portable computer equipment so as to implement hardware lock on the portable computer equipment. After the portable computer equipment is hardware locked, the portable computer equipment cannot be used and cannot be put back in use without authorization.
- a second embodiment of the present invention provides a recourse mechanism: before the portable computer equipment is hardware locked, a communication can be made with a current occupant so as to achieve the goal of getting the portable computer equipment back.
- FIG. 2 A flow chart of an anti-theft method for portable computer equipment provided in a second embodiment of the present invention is shown in Fig. 2, and the method includes following steps.
- Step 201 through a service registration process, binding identification information of a mobile terminal of a user and information of an AT module chip of a portable computer equipment of the user, storing the binding information in a database of a server at network side, and recording a state of the AT module chip as normal state.
- the identification information of a mobile terminal is to uniquely identify the mobile terminal.
- the identification information includes can be a mobile phone number, an IMEI number, an IMSI number, or other information which has unique identification function.
- the service registration process can be implemented by installing corresponding client software in the mobile terminal and direct communication with the network side.
- the service registration process can also be implemented by filling out registration information via a web page or through a mobile service hall.
- Step 202 sending, by the user through the mobile terminal, an anti-theft instruction which carries the identification information of the mobile terminal to the server at the network side, and specifying to enable "recourse function" authorization.
- the anti-theft instruction can be sent through the following way: the client software of the mobile terminal provides a virtual button of "sending anti-theft instruction" in a touch screen of the mobile terminal; after the user pushes the virtual button, the mobile terminal sends a packet, of which predefined content is an anti-theft instruction, to an address of the server.
- the user can be required to input verification codes, and the anti-theft instruction can be sent after it is verified that the verification codes are correct, thereby avoiding wrong operations or malicious operations of others.
- Enabling "recourse function" authorization can be an explicit instruction of the user to enable the authorization, or can also be enabling authorization by default.
- the anti-theft instruction can also be sent in a manner of sending a short message containing predefined strings to a specific service number, or making a voice call to operate according to prompts.
- Step 203 after the server receives the anti-theft instruction, extracting, by the server, the identification information carried in the anti-theft instruction, and looking for information of the AT module chip which is bound with the identification information in the database according to the identification information; if the information of the AT module chip which is bound with the identification information is found in the database, then performing step 204; otherwise, returning an error message to the mobile terminal and existing this process.
- Step 204 modifying, by the server, the recorded state of the AT module chip from normal state to missing state; determining, by the server, whether state information of the AT module chip contains an enabling recourse function identity. If the state information of the AT module chip contains an enabling recourse function identity, then performing step 205; otherwise, performing step 208.
- Step 205 querying, by the portable computer equipment, the state of the AT module chip corresponding to the portable computer equipment in the server; if the enabling recourse function is found, then implementing access restriction in software level to the portable computer equipment.
- Implementing access restriction in software level to the portable computer equipment i.e., prohibiting any operation except for instant communication connections, includes but is limited to, prohibiting switching or closing an instant communication window, prohibiting turning off a power or restarting operation.
- Step 206 establishing an instant communication connection between the portable computer equipment and the server; starting, by the portable computer equipment a timer; before the timer expires, staff or programs at the network side automatically communicates information with a current occupant of the portable computer equipment through the instant communication connection.
- the communicated content can include but is not limited to, notifying the current occupant that the portable computer equipment has anti-theft function and please immediately return the portable computer equipment to a designated place and a certain material rewards will be given to the current occupant; otherwise, the current occupant will bear legal responsibility.
- the portable computer equipment starts control programs in background, and collects current position information and sends the collected position information to the server at the network side. If the portable computer equipment includes a global positioning system (GPS) chip, then the portable computer equipment enables the GPS chip to position the portable computer equipment and sends positioning information to the server at the network side. If the portable computer equipment does not include a GPS chip, then the portable computer equipment implements a Wifi assisted positioning.
- GPS global positioning system
- the portable computer equipment can enable the front-facing camera to video or take a photo, and sends the video or photo to the server at the network side.
- Block 207 if the occupant agrees to return the portable computer equipment before the timer expires, then the staff at the network side instructs the portable computer equipment to maintain software lock status. If the occupant has made clear that the occupant will not return the portable computer equipment, then the staff at the network side instructs the portable computer equipment to enter into hardware lock status. If the timer expires, then the portable computer equipment automatically enters into the hardware lock status.
- Step 208 querying, by the portable computer equipment, the state of the AT module chip corresponding to the portable computer equipment; if the state is missing state, then the AT module chip locks the portable computer equipment.
- a third embodiment of the present invention provides an anti-theft system for portable computer equipment, and the system includes:
- a mobile terminal to send an anti-theft instruction carrying identification information of the mobile terminal to a server at network side;
- the server to store the identification information of the mobile terminal which is bounded with information of an AT module chip of a portable computer equipment, in a database, and record a state of the AT module chip as normal state; after the server receives the anti-theft instruction from the mobile terminal, to extract the identification information carried in the anti-theft instruction and look for information of the AT module chip which is bound with the identification information in the database; if the information of the AT module chip which is bound with the identification information is found in the database, then to modify the recorded state of the AT module chip from normal state to missing state; otherwise, to return an error message to the mobile terminal; and [0078] the portable computer equipment having the AT module chip to query the state of the AT module chip corresponding to the portable computer equipment in the server. If the state is missing state, then the AT module chip locks the portable computer equipment.
- a fourth embodiment of the present invention provides a server for implementing anti-theft of portable computer equipment, and the server includes:
- a database module to store identification information of a mobile terminal which is bounded with information of an AT module chip of a portable computer equipment
- a receiving module to receive an anti-theft instruction carrying identification information of the mobile terminal from the mobile terminal;
- a query module to extract the identification information carried in the anti-theft instruction received from the receiving module and look for information of the AT module chip which is bound with the identification information in the database module; if the information of the AT module chip which is bound with the identification information is found in the database, then to send the information of the AT module chip to a state management module;
- the state management module to store state information of the AT module chip; after receiving the information of the AT module chip from the query module, to modify the state of the corresponding AT module chip from normal state to missing state.
- the server further comprises:
- a recourse management unit to set enabling recourse function identity of the AT module chip.
- the server further comprises:
- an instant communication module to establish an instant communication connection with the portable computer equipment and make an instant communication with the portable computer equipment.
- the server further comprises:
- a remote control module to control the portable computer equipment to collect position information and receive the position information; and/or, to control the portable computer equipment to enable a front-facing camera of the portable computer equipment to video or take a photo and receive the video or photo.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephone Function (AREA)
- Telephonic Communication Services (AREA)
Abstract
The present invention provides an anti-theft method, device and system for portable computer equipment. Hardware information of a mobile terminal and a portable computer equipment of a user is bounded in advance, and the binding information is stored in a server at network side. When the user finds that the portable computer equipment is stolen, the user can use the mobile terminal to send an anti-theft instruction to the network side. After the server receives the anti-theft instruction and verifies that it is correct, the server triggers the portable computer equipment at an appropriate time to start the anti-theft management measures. Therefore, when the user finds the portable computer equipment is stolen, the user does not have to remember anything and can directly use one key of the mobile terminal to start anti-theft management measures and the risk of data leakage can be reduced as much as possible.
Description
ANTI-THEFT METHOD, DEVICE AND SYSTEM FOR PORTABLE
COMPUTER EQUIPMENT
FIELD OF THE INVENTION
[0001 ] The present invention relates to anti-theft technology for computers, and more particularly to an anti-theft method, device and system for portable computer equipment.
BACKGROUND OF THE INVENTION
[0002] For users of portable computer equipment such as notebook computers, tablet computer, and so on, they don't want an event that the portable computer equipment is stolen or lost to occur, but they might have to face such an event. Once the portable computer equipment is lost, relative to the loss of the monetary value of hardware of the portable computer equipment itself, the loss arising from loss or leakage of data stored in the portable computer equipment may be more difficult to be measured. Intel's Anti-Theft technology can remotely lock a stolen computer, so that the stolen computer cannot work normally and data stored in the stolen computer cannot be obtained, thereby building a sturdy barrier to protect the user's utilization of the computer.
[0003] Intel's Anti-Theft technology is implemented through an AT module chip implanted on a motherboard. When the AT module chip checks that a notebook computer is in a state of being stolen, the AT module chip automatically starts a theft mode and executes anti-theft management measures predefined in advance by a user of the notebook computer, so that hardware of the notebook computer is locked and cannot be used.
[0004] Ways in which the AT module chip determines whether the notebook computer is stolen mainly include following several types.
[0005] 1 . Excessive number of failed login account: the AT module chip can set displaying a login window before operation of a system, just like BIOS setting password. When a number of attempts to enter a password exceeds a preset warning value, the system automatically shuts down and starts the anti-theft management measures.
[0006] 2. Failure to check in with an AT server within a preset time: in addition to set a client module in the notebook computer side, Intel's Anti-Theft technology also includes an AT server at network side. An IT administrator can set check-in intervals for the client. When the notebook computer boots up, the client automatically sends a boot message to the AT server, if the client does not check in with the AT server within the preset time, the client automatically starts the anti-theft management measures.
[0007] 3. Reporting model: if the user has found that the notebook computer has been stolen, the user can user another computer to login a corresponding page to notify the IT administrator that the notebook computer is stolen. Then the IT administrator can set that the notebook computer has been registered as in stolen state in the AT server. Once the stolen notebook computer is connected to Internet, the AT module chip receives a theft notification from the AT server at the network side and then automatically starts the anti-theft management measures.
[0008] The above ways of determining whether the notebook computer is stolen have following problems.
[0009] If the notebook computer is active when it is stolen, then the ways 1 or 2 cannot trigger starting the anti-theft management measures until the notebook computer boots up for the next time. For the way 3, the user may have no other computer at hand when the user finds that the notebook computer has been stolen, and it will take a period of time before the user can use another computer to login page to trigger the anti-theft management measures. In this period of time, data in the stolen notebook computer may be leaked. Further, when the user logins the anti-theft management page, the user not only needs to remember a website of the anti-theft management page, but also input information such as user name, password, etc. with the user's own memory. If the information is forgotten, then the anti-theft cannot be implemented and it is not convenient for the user to use the notebook computer. In conclusion, the existing anti-theft technology has following disadvantages: the user finds that the notebook computer has been stolen or may be in a state of being stolen, the user cannot quickly and easily start the anti-theft management measures in the first time.
SUMMARY OF THE INVENTION
[0010] The present invention provides an anti-theft method, device and system for portable computer equipment, through which anti-theft management measures can be quickly and easily started in the first time after a notebook computer is stolen.
[0011 ] An anti-theft method for portable computer equipment provided in one embodiment of the present invention, the method includes:
[0012] A. binding identification information of a mobile terminal of a user and information of an AT module chip of a portable computer equipment of the user, storing the binding information in a database of a server at network side, and recording a state of the AT module chip as normal state;
[0013] B. sending, by the user through the mobile terminal, an anti-theft instruction which carries the identification information of the mobile terminal to the server at the network side;
[0014] C. after the server receives the anti-theft instruction, extracting, by the server, the identification information carried in the anti-theft instruction, and looking for information of the AT module chip which is bound with the identification information in the database; if the information of the AT module chip which is bound with the identification information is found in the database, then performing step D; otherwise, returning an error message to the mobile terminal and existing this process;
[0015] D. modifying, by the server, the recorded state of the AT module chip from normal state to missing state; and
[001 6] E. querying, by the portable computer equipment, the state of the AT module chip corresponding to the portable computer equipment in the server; if the state is missing state, then the AT module chip locks the portable computer equipment; if the state is normal state, then ending the process.
[0017] Preferably, the identification information of the mobile terminal comprises a user name and password, a mobile phone number, an international Mobile Equipment Identity (IMEI) number or an International Mobile Subscriber Identification (IMSI) number.
[0018] Preferably, the step B comprises:
[0019] providing, by a client software of the mobile terminal, a virtual button of "sending anti-theft instruction" in a touch screen of the mobile terminal; after the user pushes the virtual button, sending, by the mobile terminal, a packet of which predefined content is the anti-theft instruction, to an address of the server.
[0020] Preferably, before the step C, the method further comprises: setting an enabling recourse function identity in the recorded state information of the AT module chip;
[0021 ] the step D comprises: determining, by the server, whether the state information of the AT module chip contains the enabling recourse function identity; if the state information of the AT module chip contains an enabling recourse function identity, then performing step F; otherwise, performing the step E;
[0022] the method further comprises step F: querying, by the portable computer equipment, the state of the AT module chip corresponding to the portable computer equipment in the server; if the enabling recourse function is found, then implementing access restriction in software level to the portable computer equipment.
[0023] Preferably, the step F further comprises: establishing an instant communication connection between the portable computer equipment and the server.
[0024] Preferably, the step F further comprises:
[0025] starting in background, by the portable computer equipment, control programs in background, and collecting current position information and sending the collected position information to the server; and/or, enabling, by the portable computer equipment, a front-facing camera of the portable computer equipment to video or take a photo, and sending the video or photo to the server.
[0026] Preferably, after the step F, the method further comprises: sending, by the server, a lock instruction to the portable computer equipment; after the portable computer equipment receives the lock instruction, locking, by the AT
module chip, the portable computer chip.
[0027] Preferably, the portable computer equipment is a notebook computer, a netbook or a tablet computer.
[0028] Another embodiment of the present invention further provides an anti-theft AT system for portable computer equipment, the system includes:
[0029] a mobile terminal to send an anti-theft instruction carrying identification information of a mobile terminal to a server at network side;
[0030] the server to store the identification information of the mobile terminal which is bounded with information of an AT module chip of a portable computer equipment, in a database, and record a state of the AT module chip as normal state; after the server receives the anti-theft instruction from the mobile terminal, to extract the identification information carried in the anti-theft instruction and look for information of the AT module chip which is bound with the identification information of the mobile terminal in the database; if the information of the AT module chip which is bound with the identification information is found in the database, then to modify the state of the AT module chip from normal state to missing state; otherwise, to return an error message to the mobile terminal; and
[0031 ] the portable computer equipment having the AT module chip to query the state of the AT module chip corresponding to the portable computer equipment in the server; if the state is missing state, then the AT module chip locks the portable computer equipment.
[0032] Another embodiment of the present invention further provides a server for implementing anti-theft of portable computer equipment, the server includes:
[0033] a database module to store identification information of a mobile terminal which is bounded with information of an AT module chip of a portable computer equipment;
[0034] a receiving module to receive an anti-theft instruction carrying the identification information of the mobile terminal from the mobile terminal;
[0035] a query module to extract the identification information of the mobile terminal carried in the anti-theft instruction received from the receiving
module and look for information of the AT module chip which is bound with the identification information of the mobile terminal stored in the database module; if the information of the AT module chip which is bound with the identification information is found, then to send the information of the AT module chip to a state management module;
[0036] the state management module to store state information of the AT module chip; after receiving the information of the AT module chip from the query module, to modify the state of the corresponding AT module chip from normal state to missing state.
[0037] Preferably, the state management module further comprises:
[0038] a recourse management unit to set enabling recourse function identity of the AT module chip.
[0039] Preferably, the server further comprises:
[0040] an instant communication module to establish an instant communication connection with the portable computer equipment and make an instant communication with the portable computer equipment.
[0041 ] Preferably, the server further comprises:
[0042] a remote control module to control the portable computer equipment to collect position information and receive the position information; and/or, to control the portable computer equipment to enable a front-facing camera of the portable computer equipment to video or take a photo and receive the video or photo.
[0043] It can be seen from the above technical solution, hardware information of a mobile terminal of a user and a portable computer equipment of the user is bounded in advance, and the binding information is stored in a server at network side. When the user finds that the portable computer equipment is stolen, the user can use the mobile terminal such a mobile phone to send an anti-theft instruction to the network side. After the server receives the anti-theft instruction and verifies that it is correct, the server triggers the portable computer equipment at an appropriate time to start the anti-theft management measures. The solution of the present invention uses the characteristics that the mobile terminals have network communication function,
when a user finds a portable computer equipment is stolen, the user does not need to remember a website of an anti-theft management page, etc. and can directly use one key of the mobile terminal to start anti-theft management measures, therefore, the user can conveniently and quickly use the anti-theft management measures, and the risk of data leakage can be reduced as much as possible.
BRIEF DESCRIPTION OF THE DRAWINGS
[0044] Features of the present disclosure are illustrated by way of example and not limited in the following figure(s), in which like numerals indicate like elements, in which:
[0045] Fig. 1 is a flow chart of an anti-theft method for portable computer equipment provided in a first embodiment of the present invention; and
[0046] Fig. 2 is a flow chart of an anti-theft method for portable computer equipment provided in a second embodiment of the present invention.
DETAILED DESCRIPTION OF THE INVENTION
[0044] For simplicity and illustrative purposes, the present disclosure is described by referring mainly to an example thereof. In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present disclosure. It will be readily apparent however, that the present disclosure may be practiced without limitation to these specific details. In other instances, some methods and structures have not been described in detail so as not to unnecessarily obscure the present disclosure. Throughout the present disclosure, the terms "a" and "an" are intended to denote at least one of a particular element. As used herein, the term "includes" means includes but not limited to, the term "including" means including but not limited to. The term "based on" means based at least in part on.
[0045] The basic idea of the present invention is: binding in advance hardware information of a mobile terminal of a user and a portable computer equipment of the user, and storing the binding information in a server at network side. When the user finds that the portable computer equipment is stolen, the user can use the mobile terminal such a mobile phone to send an anti-theft instruction to the network side. After the server receives the anti-theft instruction and verifies that it is correct, the server triggers the portable computer equipment at an appropriate time to start the anti-theft management measures. The portable computer equipment includes but is not limited to a notebook computer, a netbook or a tablet computer.
[0046] Since the popularity of mobile terminals such as mobile phones is currently very high and almost everyone has one, by utilization of characteristics that the mobile terminals have network communication function, when a user finds a portable computer equipment is stolen, the user does not need to remember a website of an anti-theft management page, etc. and can directly use one key of the mobile terminal to start anti-theft management measures, therefore, the user can conveniently and quickly use the anti-theft management measures, and the risk of data leakage can be reduced as much as possible.
[0047] To better explain technical principles, characteristics, and advantages of technical solution of the present invention, various embodiments of present invention will be described in detail with reference to the accompanying drawings.
[0048] A flow chart of an anti-theft method for portable computer equipment provided in a first embodiment of the present invention is shown in Fig. 1 , and the method includes following steps.
[0049] Step 101 : through a service registration process, binding identification information of a mobile terminal of a user and information of an AT module chip of a portable computer equipment of the user, storing the binding information in a database of a server at network side, and recording a state of the AT module chip as normal state.
[0050] The identification information of a mobile terminal is to uniquely identify the mobile terminal. The identification information includes but is not limited to a mobile phone number, an international Mobile Equipment Identity (IMEI) number, an International Mobile Subscriber Identification (IMSI) number, a custom user name and password, and other information which has unique identification function, or any combination of the above content and variations thereof. The service registration process can be implemented by installing corresponding client software in the mobile terminal and direct communication with the network side. The service registration process can also be implemented by filling out registration information via a web page or through a mobile service hall. The AT module chip includes but is not limited to an anti-theft chip developed based on Intel's Anti-Theft technology.
[0051 ] If the user has a plurality of portable computer equipments, the use can bind the plurality of portable computer equipments with the same mobile terminal. But when an anti-theft instruction is sent in the following step, it needs to specify that the anti-theft instruction is for which of the plurality of portable computer equipments.
[0052] Step 102: sending, by the user through the mobile terminal, an anti-theft instruction which carries the identification information of the mobile terminal to the server at the network side.
[0053] The anti-theft instruction can be sent through the following way: the client software of the mobile terminal provides a virtual button of "sending anti-theft instruction" in a touch screen of the mobile terminal; after the user pushes the virtual button, the mobile terminal sends a packet, of which predefined content is an anti-theft instruction, to an address of the server. Preferably, before sending the anti-theft instruction, the user can be required to input verification codes, and the anti-theft instruction can be sent after it is verified that the verification codes are correct, thereby avoiding wrong operations or malicious operations of others. The sending process can use any conventional encryption.
[0054] The anti-theft instruction can also be sent in a manner of sending a short message containing predefined strings to a specific service number, or making a voice call to operate according to prompts.
[0055] Step 103: after the server receives the anti-theft instruction, extracting, by the server, the identification information carried in the anti-theft instruction, and looking for information of the AT module chip which is bound with the identification information in the database according to the identification information; if the information of the AT module chip which is bound with the identification information is found in the database, then performing step 104; otherwise, returning an error message to the mobile terminal and existing this process.
[0056] Step 104: modifying, by the server, the recorded state of the AT module chip from normal state to missing state.
[0057] Step 105: querying, by the portable computer equipment, the state of the AT module chip corresponding to the portable computer equipment in the server; if the state is missing state, then the AT module chip locks the portable computer equipment; if the state is normal state, then ending the process.
[0058] In some applications, the user may just want to temporarily lock the user's portable computer equipment so that other persons cannot use the user's portable computer equipment, and subsequently unlock. In order to meet such a need, an access restriction function in software level can also be provided, so that the portable computer equipment can implement software
access restrictions at an operating system level to the portable computer equipment so as to prohibit utilization of other programs, but the portable computer equipment is still in a state of capable of receiving instructions from the network side. If the portable computer equipment receives an unlock instruction, the portable computer equipment implements software unlock so that the portable computer equipment can be put back in use. When the portable computer equipment is in a state of software access restrictions, a lock instruction can be sent from the network side to the portable computer equipment so as to implement hardware lock on the portable computer equipment. After the portable computer equipment is hardware locked, the portable computer equipment cannot be used and cannot be put back in use without authorization.
[0059] Through the solution of the first embodiment, after the user finds that the portable computer equipment is lost, the user can lock the portable computer equipment at once. This can effectively prevent leakage of data files stored in the portable computer device, and make the theft unprofitable. But, through the solution of the first embodiment, it is difficult for the user to get the portable computer back. In order to facilitate getting the portable computer back, a second embodiment of the present invention provides a recourse mechanism: before the portable computer equipment is hardware locked, a communication can be made with a current occupant so as to achieve the goal of getting the portable computer equipment back.
[0060] A flow chart of an anti-theft method for portable computer equipment provided in a second embodiment of the present invention is shown in Fig. 2, and the method includes following steps.
[0061 ] Step 201 : through a service registration process, binding identification information of a mobile terminal of a user and information of an AT module chip of a portable computer equipment of the user, storing the binding information in a database of a server at network side, and recording a state of the AT module chip as normal state.
[0062] The identification information of a mobile terminal is to uniquely identify the mobile terminal. The identification information includes can be a
mobile phone number, an IMEI number, an IMSI number, or other information which has unique identification function. The service registration process can be implemented by installing corresponding client software in the mobile terminal and direct communication with the network side. The service registration process can also be implemented by filling out registration information via a web page or through a mobile service hall.
[0063] Step 202: sending, by the user through the mobile terminal, an anti-theft instruction which carries the identification information of the mobile terminal to the server at the network side, and specifying to enable "recourse function" authorization.
[0064] The anti-theft instruction can be sent through the following way: the client software of the mobile terminal provides a virtual button of "sending anti-theft instruction" in a touch screen of the mobile terminal; after the user pushes the virtual button, the mobile terminal sends a packet, of which predefined content is an anti-theft instruction, to an address of the server. Preferably, before sending the anti-theft instruction, the user can be required to input verification codes, and the anti-theft instruction can be sent after it is verified that the verification codes are correct, thereby avoiding wrong operations or malicious operations of others. Enabling "recourse function" authorization can be an explicit instruction of the user to enable the authorization, or can also be enabling authorization by default.
[0065] The anti-theft instruction can also be sent in a manner of sending a short message containing predefined strings to a specific service number, or making a voice call to operate according to prompts.
[0066] Step 203: after the server receives the anti-theft instruction, extracting, by the server, the identification information carried in the anti-theft instruction, and looking for information of the AT module chip which is bound with the identification information in the database according to the identification information; if the information of the AT module chip which is bound with the identification information is found in the database, then performing step 204; otherwise, returning an error message to the mobile terminal and existing this process.
[0067] Step 204: modifying, by the server, the recorded state of the AT module chip from normal state to missing state; determining, by the server, whether state information of the AT module chip contains an enabling recourse function identity. If the state information of the AT module chip contains an enabling recourse function identity, then performing step 205; otherwise, performing step 208.
[0068] Step 205: querying, by the portable computer equipment, the state of the AT module chip corresponding to the portable computer equipment in the server; if the enabling recourse function is found, then implementing access restriction in software level to the portable computer equipment. Implementing access restriction in software level to the portable computer equipment, i.e., prohibiting any operation except for instant communication connections, includes but is limited to, prohibiting switching or closing an instant communication window, prohibiting turning off a power or restarting operation.
[0069] Step 206: establishing an instant communication connection between the portable computer equipment and the server; starting, by the portable computer equipment a timer; before the timer expires, staff or programs at the network side automatically communicates information with a current occupant of the portable computer equipment through the instant communication connection.
[0070] The communicated content can include but is not limited to, notifying the current occupant that the portable computer equipment has anti-theft function and please immediately return the portable computer equipment to a designated place and a certain material rewards will be given to the current occupant; otherwise, the current occupant will bear legal responsibility.
[0071 ] Preferably, the portable computer equipment starts control programs in background, and collects current position information and sends the collected position information to the server at the network side. If the portable computer equipment includes a global positioning system (GPS) chip, then the portable computer equipment enables the GPS chip to position the portable computer equipment and sends positioning information to the server at
the network side. If the portable computer equipment does not include a GPS chip, then the portable computer equipment implements a Wifi assisted positioning.
[0072] Preferably, if the portable computer equipment includes a front-facing camera, then the portable computer equipment can enable the front-facing camera to video or take a photo, and sends the video or photo to the server at the network side.
[0073] Block 207: if the occupant agrees to return the portable computer equipment before the timer expires, then the staff at the network side instructs the portable computer equipment to maintain software lock status. If the occupant has made clear that the occupant will not return the portable computer equipment, then the staff at the network side instructs the portable computer equipment to enter into hardware lock status. If the timer expires, then the portable computer equipment automatically enters into the hardware lock status.
[0074] Step 208: querying, by the portable computer equipment, the state of the AT module chip corresponding to the portable computer equipment; if the state is missing state, then the AT module chip locks the portable computer equipment.
[0075] A third embodiment of the present invention provides an anti-theft system for portable computer equipment, and the system includes:
[0076] a mobile terminal to send an anti-theft instruction carrying identification information of the mobile terminal to a server at network side;
[0077] the server to store the identification information of the mobile terminal which is bounded with information of an AT module chip of a portable computer equipment, in a database, and record a state of the AT module chip as normal state; after the server receives the anti-theft instruction from the mobile terminal, to extract the identification information carried in the anti-theft instruction and look for information of the AT module chip which is bound with the identification information in the database; if the information of the AT module chip which is bound with the identification information is found in the database, then to modify the recorded state of the AT module chip from normal state to
missing state; otherwise, to return an error message to the mobile terminal; and [0078] the portable computer equipment having the AT module chip to query the state of the AT module chip corresponding to the portable computer equipment in the server. If the state is missing state, then the AT module chip locks the portable computer equipment.
[0079] A fourth embodiment of the present invention provides a server for implementing anti-theft of portable computer equipment, and the server includes:
[0080] a database module to store identification information of a mobile terminal which is bounded with information of an AT module chip of a portable computer equipment;
[0081 ] a receiving module to receive an anti-theft instruction carrying identification information of the mobile terminal from the mobile terminal;
[0082] a query module to extract the identification information carried in the anti-theft instruction received from the receiving module and look for information of the AT module chip which is bound with the identification information in the database module; if the information of the AT module chip which is bound with the identification information is found in the database, then to send the information of the AT module chip to a state management module;
[0083] the state management module to store state information of the AT module chip; after receiving the information of the AT module chip from the query module, to modify the state of the corresponding AT module chip from normal state to missing state. Preferably, the server further comprises:
[0084] a recourse management unit to set enabling recourse function identity of the AT module chip.
[0085] Preferably, the server further comprises:
[0086] an instant communication module to establish an instant communication connection with the portable computer equipment and make an instant communication with the portable computer equipment.
[0087] Preferably, the server further comprises:
[0088] a remote control module to control the portable computer equipment to collect position information and receive the position information;
and/or, to control the portable computer equipment to enable a front-facing camera of the portable computer equipment to video or take a photo and receive the video or photo.
[0089] The foregoing are only preferred embodiments of the present invention, and are not used to limit the present invention. Any modification, equivalent replacement, or improvement made without departing from the spirit and principle of the present invention should fall within the scope of the present invention.
Claims
1 . An anti-theft method for portable computer equipment, comprising:
A. binding identification information of a mobile terminal of a user and information of an AT module chip of a portable computer equipment of the user, storing the binding information in a database of a server at network side, and recording a state of the AT module chip as normal state;
B. sending, by the user through the mobile terminal, an anti-theft instruction which carries the identification information of the mobile terminal to the server at the network side;
C. after the server receives the anti-theft instruction, extracting, by the server, the identification information carried in the anti-theft instruction, and looking for information of the AT module chip which is bound with the identification information in the database; if the information of the AT module chip which is bound with the identification information is found in the database, then performing step D; otherwise, returning an error message to the mobile terminal and existing this process;
D. modifying, by the server, the recorded state of the AT module chip from normal state to missing state; and
E. querying, by the portable computer equipment, the state of the AT module chip corresponding to the portable computer equipment in the server; if the state is missing state, then the AT module chip locks the portable computer equipment; if the state is normal state, then ending the process.
2. The method of claim 1 , wherein the identification information of the mobile terminal comprises a user name and password, a mobile phone number, an international Mobile Equipment Identity (IMEI) number or an International Mobile Subscriber Identification (IMSI) number.
3. The method of claim 1 , wherein the step B comprises:
providing, by a client software of the mobile terminal, a virtual button of "sending anti-theft instruction" in a touch screen of the mobile terminal; after the
user pushes the virtual button, sending, by the mobile terminal, a packet of which predefined content is the anti-theft instruction, to an address of the server.
4. The method of claim 1 , wherein before the step C, the method further comprises: setting an enabling recourse function identity in the recorded state information of the AT module chip;
the step D comprises: determining, by the server, whether the state information of the AT module chip contains the enabling recourse function identity; if the state information of the AT module chip contains an enabling recourse function identity, then performing step F; otherwise, performing the step E;
the method further comprises step F: querying, by the portable computer equipment, the state of the AT module chip corresponding to the portable computer equipment in the server; if the enabling recourse function is found, then implementing access restriction in software level to the portable computer equipment.
5. The method of claim 4, wherein the step F further comprises: establishing an instant communication connection between the portable computer equipment and the server.
6. The method of claim 4, wherein the step F further comprises:
starting in background, by the portable computer equipment, control programs in background, and collecting current position information and sending the collected position information to the server; and/or, enabling, by the portable computer equipment, a front-facing camera of the portable computer equipment to video or take a photo, and sending the video or photo to the server.
7. The method of any one of claims 4 to 7, wherein after the step F, the method further comprises: sending, by the server, a lock instruction to the portable computer equipment; after the portable computer equipment receives the lock instruction, locking, by the AT module chip, the portable computer chip.
8. The method of any one of claims 1 to 6 wherein the portable computer equipment is a notebook computer, a netbook or a tablet computer.
9. An anti-theft AT system for portable computer equipment, the system comprising:
a mobile terminal to send an anti-theft instruction carrying identification information of a mobile terminal to a server at network side;
the server to store the identification information of the mobile terminal which is bounded with information of an AT module chip of a portable computer equipment, in a database, and record a state of the AT module chip as normal state; after the server receives the anti-theft instruction from the mobile terminal, to extract the identification information carried in the anti-theft instruction and look for information of the AT module chip which is bound with the identification information of the mobile terminal in the database; if the information of the AT module chip which is bound with the identification information is found in the database, then to modify the state of the AT module chip from normal state to missing state; otherwise, to return an error message to the mobile terminal; and the portable computer equipment having the AT module chip to query the state of the AT module chip corresponding to the portable computer equipment in the server; if the state is missing state, then the AT module chip locks the portable computer equipment.
10. A server for implementing anti-theft of portable computer equipment, the server comprising:
a database module to store identification information of a mobile terminal which is bounded with information of an AT module chip of a portable computer equipment;
a receiving module to receive an anti-theft instruction carrying the identification information of the mobile terminal from the mobile terminal;
a query module to extract the identification information of the mobile terminal carried in the anti-theft instruction received from the receiving module and look for information of the AT module chip which is bound with the identification
information of the mobile terminal stored in the database module; if the information of the AT module chip which is bound with the identification information is found, then to send the information of the AT module chip to a state management module;
the state management module to store state information of the AT module chip; after receiving the information of the AT module chip from the query module, to modify the state of the corresponding AT module chip from normal state to missing state.
11 . The server of claim 10, wherein the state management module further comprises:
a recourse management unit to set enabling recourse function identity of the AT module chip.
12. The server of claim 11 , wherein the server further comprises:
an instant communication module to establish an instant communication connection with the portable computer equipment and make an instant communication with the portable computer equipment.
13. The server of claim 11 or 12, wherein the server further comprises:
a remote control module to control the portable computer equipment to collect position information and receive the position information; and/or, to control the portable computer equipment to enable a front-facing camera of the portable computer equipment to video or take a photo and receive the video or photo.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210140390.3A CN102693381B (en) | 2012-05-08 | 2012-05-08 | Method, device and system for anti-theft of portable computer equipment |
CN201210140390.3 | 2012-05-08 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2013166886A1 true WO2013166886A1 (en) | 2013-11-14 |
Family
ID=46858806
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2013/072986 WO2013166886A1 (en) | 2012-05-08 | 2013-03-21 | Anti-theft method, device and system for portable computer equipment |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN102693381B (en) |
WO (1) | WO2013166886A1 (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104168489A (en) * | 2014-08-20 | 2014-11-26 | 乐视网信息技术(北京)股份有限公司 | Data protection method of smart television, server and smart television |
CN104182707A (en) * | 2014-08-12 | 2014-12-03 | 广东欧珀移动通信有限公司 | Anti-theft method and device for handheld intelligent mobile terminal |
CN104853032A (en) * | 2015-03-28 | 2015-08-19 | 深圳市金立通信设备有限公司 | Data processing method |
WO2015196708A1 (en) * | 2014-06-26 | 2015-12-30 | 小米科技有限责任公司 | File locking method and apparatus |
CN105574448A (en) * | 2015-12-22 | 2016-05-11 | 惠州Tcl移动通信有限公司 | Method for preventing terminal loss based on human characteristic parameters and terminal |
US9904774B2 (en) | 2014-06-26 | 2018-02-27 | Xiaomi Inc. | Method and device for locking file |
CN108241809A (en) * | 2017-12-29 | 2018-07-03 | 申子涵 | A kind of method for preventing from carrying out mobile terminal in illegal brush machine |
CN117034377A (en) * | 2023-07-11 | 2023-11-10 | 成都安易迅科技有限公司 | Safety protection system |
Families Citing this family (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102693381B (en) * | 2012-05-08 | 2015-04-15 | 张�林 | Method, device and system for anti-theft of portable computer equipment |
CN103347131B (en) * | 2013-07-05 | 2015-10-28 | 张�林 | A kind of intelligent mobile phone anti-theft method and system |
CN105100131A (en) * | 2014-04-25 | 2015-11-25 | 北京奇虎科技有限公司 | Terminal device and terminal device theft prevention method and system |
CN104010367A (en) * | 2014-06-10 | 2014-08-27 | 陆俊 | Tracking method and system for stolen mobile terminals |
CN105335677A (en) * | 2014-07-24 | 2016-02-17 | 小米科技有限责任公司 | Anti-theft method and device of mobile terminal |
CN105447345A (en) * | 2014-09-30 | 2016-03-30 | 宇龙计算机通信科技(深圳)有限公司 | Mobile terminal application control method and apparatus |
CN106162607A (en) * | 2015-03-24 | 2016-11-23 | 中兴通讯股份有限公司 | The management method of a kind of virtual SIM card, device and system |
CN109600519B (en) * | 2016-09-29 | 2021-01-05 | 李信 | Mobile phone control method and system |
CN106874795B (en) * | 2017-01-16 | 2020-12-08 | 北京安云世纪科技有限公司 | Mobile terminal and machine disassembly prevention method and device thereof |
CN107517278A (en) * | 2017-10-11 | 2017-12-26 | 上海展扬通信技术有限公司 | The long-range control method and tele-control system of a kind of intelligent terminal |
CN109497627A (en) * | 2018-12-26 | 2019-03-22 | 南昌与德软件技术有限公司 | Electronic cigarette device, cigarette control blue-tooth device and electronic cigarette dating system |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2011139484A (en) * | 2005-08-12 | 2011-07-14 | Sii Ido Tsushin Kk | Remote locking system and communication terminal |
CN102167012A (en) * | 2011-03-24 | 2011-08-31 | 广州超前计算机科技有限公司 | Automobile remote burglary prevention method and system using same |
CN102693381A (en) * | 2012-05-08 | 2012-09-26 | 张�林 | Method, device and system for anti-theft of portable computer equipment |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060209763A1 (en) * | 2005-03-21 | 2006-09-21 | Emeott Stephen P | Multi-mode link adaptation |
CN101131723B (en) * | 2006-08-21 | 2010-06-02 | 杭州小尔科技有限公司 | System and method deleting internal memory document in notebook computer by mobile phone |
CN101471798A (en) * | 2007-12-27 | 2009-07-01 | 英业达股份有限公司 | Method for assist seek of pilferage as well as server and system using the method |
-
2012
- 2012-05-08 CN CN201210140390.3A patent/CN102693381B/en active Active
-
2013
- 2013-03-21 WO PCT/CN2013/072986 patent/WO2013166886A1/en active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2011139484A (en) * | 2005-08-12 | 2011-07-14 | Sii Ido Tsushin Kk | Remote locking system and communication terminal |
CN102167012A (en) * | 2011-03-24 | 2011-08-31 | 广州超前计算机科技有限公司 | Automobile remote burglary prevention method and system using same |
CN102693381A (en) * | 2012-05-08 | 2012-09-26 | 张�林 | Method, device and system for anti-theft of portable computer equipment |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2015196708A1 (en) * | 2014-06-26 | 2015-12-30 | 小米科技有限责任公司 | File locking method and apparatus |
US9904774B2 (en) | 2014-06-26 | 2018-02-27 | Xiaomi Inc. | Method and device for locking file |
CN104182707A (en) * | 2014-08-12 | 2014-12-03 | 广东欧珀移动通信有限公司 | Anti-theft method and device for handheld intelligent mobile terminal |
CN104168489A (en) * | 2014-08-20 | 2014-11-26 | 乐视网信息技术(北京)股份有限公司 | Data protection method of smart television, server and smart television |
CN104853032A (en) * | 2015-03-28 | 2015-08-19 | 深圳市金立通信设备有限公司 | Data processing method |
CN105574448A (en) * | 2015-12-22 | 2016-05-11 | 惠州Tcl移动通信有限公司 | Method for preventing terminal loss based on human characteristic parameters and terminal |
CN108241809A (en) * | 2017-12-29 | 2018-07-03 | 申子涵 | A kind of method for preventing from carrying out mobile terminal in illegal brush machine |
CN117034377A (en) * | 2023-07-11 | 2023-11-10 | 成都安易迅科技有限公司 | Safety protection system |
Also Published As
Publication number | Publication date |
---|---|
CN102693381B (en) | 2015-04-15 |
CN102693381A (en) | 2012-09-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2013166886A1 (en) | Anti-theft method, device and system for portable computer equipment | |
CN101772018B (en) | The theft preventing method of theft preventing mobile terminal and mobile terminal | |
EP2579141B1 (en) | Method and device for unlocking operating system | |
EP2888855B1 (en) | Systems and methods for lock access management using wireless signals | |
US8321916B2 (en) | Method, apparatus and system for remote management of mobile devices | |
CN108307674A (en) | A kind of method and apparatus ensureing terminal security | |
ES2767601T3 (en) | Server and procedure for remote control of the operation of a communication terminal, and a communication terminal | |
WO2016034090A1 (en) | Method and system for improving security of mobile terminal | |
US20090183266A1 (en) | Method and a system for recovering a lost or stolen electronic device | |
EP3941014A1 (en) | Digital key-based identity authentication method, terminal apparatus, and medium | |
CN105530356A (en) | Mobile communication terminal and data protection method and device thereof | |
CN104486727A (en) | Mobile phone anti-theft method and system based on Android system | |
CN103118357A (en) | Antitheft system and antitheft method for mobile terminals | |
CN102316132A (en) | The network equipment login method and the network equipment | |
WO2018010480A1 (en) | Network locking method for esim card, terminal, and network locking authentication server | |
WO2016072833A1 (en) | System and method to disable factory reset | |
WO2015077947A1 (en) | System for recovering lost device | |
WO2016115760A1 (en) | Terminal system control method, device, and terminal | |
WO2011140756A1 (en) | Mobile terminal, data protection method of mobile terminal and monitor system of mobile terminal | |
WO2010133108A1 (en) | Method, system and mobile terminal for retrieving flash data of a mobile terminal | |
CN106507300A (en) | A kind of method for giving loss terminal for change, device and terminal | |
CN103476025A (en) | Progress management method, progress management system and mobile terminal | |
CN108600964B (en) | Mobile terminal tracking and positioning system | |
CN104917737B (en) | User account protection method and device | |
CN107154999B (en) | Terminal and unlocking method and storage device based on environmental information |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 13787583 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 13787583 Country of ref document: EP Kind code of ref document: A1 |