CN105282700A - Tracking method, tracking server, and tracking system - Google Patents

Tracking method, tracking server, and tracking system Download PDF

Info

Publication number
CN105282700A
CN105282700A CN201410351565.4A CN201410351565A CN105282700A CN 105282700 A CN105282700 A CN 105282700A CN 201410351565 A CN201410351565 A CN 201410351565A CN 105282700 A CN105282700 A CN 105282700A
Authority
CN
China
Prior art keywords
mobile terminal
tracking server
information
stolen
suspect
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410351565.4A
Other languages
Chinese (zh)
Inventor
陈勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201410351565.4A priority Critical patent/CN105282700A/en
Priority to PCT/CN2014/086553 priority patent/WO2015117315A1/en
Publication of CN105282700A publication Critical patent/CN105282700A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/029Location-based management or tracking services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/126Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning

Abstract

The invention discloses a tracking method, a tracking server, and a tracking system. The tracking method comprises steps that a mobile terminal sends a stolen notice to the tracking server when determining that the mobile terminal is stolen; the tracking server, after receiving the stolen notice sent from the mobile terminal, acquires the information of users within the same position area range of the mobile terminal at N different time points, and considers a user as a suspect, wherein the number of appearance times of the user in the N acquired results is more than or equal to M. Once the suspect is determined, in a subsequent tracking process, even though the stolen mobile terminal cannot normally report positional information because of no power or no signals, the tracking method may directly track the determined suspect without requiring the mobile terminal to report the positional information in the whole process in order to retrieve the mobile terminal. Thus, the tracking method increases a success rate and efficiency of retrieving the stolen mobile terminal, and reduces the potential safety hazard of the user of the stolen mobile terminal as much as possible.

Description

Method for tracing, tracking server and tracing system
Technical field
The present invention relates to the communications field, be specifically related to a kind of method for tracing, tracking server and tracing system.
Background technology
At present, the mobile terminal that market has much there is remote control function, positioning function can be realized, its basic function can both realize carrying out concentrating for the position of mobile terminal being reported to server substantially, is convenient to position or trace information that administrative staff check mobile terminal.This is to this kind of mobile terminal, and for the ease of giving for change when mobile terminal is lost, existing way utilizes the position of this mobile terminal or trace information to position it, then carries out follow-up tracking based on this location.This just requires that mobile terminal all needs to report its positional information at whole tracing process (tracing process herein refers to that mobile terminal is lost to mobile terminal by the whole process given for change).Therefore when the mobile terminal short of electricity of losing or when there is no signal, its positional information then can not normally report by mobile terminal, now then lose the foundation finding mobile terminal, reduce the success rate that mobile terminal is successfully recovered and the efficiency finding mobile terminal, cause larger potential safety hazard to user to a certain extent.
Summary of the invention
The main technical problem to be solved in the present invention is, provides a kind of method for tracing, tracking server and tracing system, solves existing for needing dependence mobile terminal normally to report its positional information problem in the whole tracing process of stolen mobile terminal.
For solving the problems of the technologies described above, the invention provides a kind of method for tracing, comprising:
The stolen notice that tracking server mobile terminal receive reports;
Tracking server obtains and the user profile of described mobile terminal in same position regional extent respectively at N number of different time;
The user that occurrence number in N acquisition result is more than or equal to M time is defined as suspect by tracking server; Described M is less than or equal to described N.
In an embodiment of the present invention, before the stolen notice that described tracking server mobile terminal receive reports, also comprise:
Receive the evidence obtaining strategy formulated for described mobile terminal;
Described tracking server, after the stolen notice receiving described mobile terminal reporting, also comprises:
Issue corresponding evidence obtaining instruction according to described evidence obtaining strategy to described mobile terminal to collect evidence with the evidence obtaining function of opening described mobile terminal corresponding;
Receive the evidence obtaining response message of described mobile terminal feedback; Described evidence obtaining response message comprises evidence obtaining content.
In an embodiment of the present invention, described evidence obtaining strategy comprise recording, take pictures, make a video recording, at least one in remote call-in.
In an embodiment of the present invention, described tracking server, after receiving the stolen notice of described mobile terminal reporting, also comprises: the associated user to preset described mobile terminal sends for notifying the warning information that described mobile terminal is stolen.
In an embodiment of the present invention, described tracking server, when receiving the stolen notice of described mobile terminal reporting, before sending described warning information, also comprises and obtains the current positional information of described mobile terminal to described associated user; Described positional information is comprised in described warning information.
In an embodiment of the present invention, described tracking server, after receiving the trace instruction that described associated user issues according to described warning information, just obtains user profile with this mobile terminal in same position regional extent respectively at N number of different time and/or tactfully issues corresponding evidence obtaining instruction to described mobile terminal according to described evidence obtaining.
In an embodiment of the present invention, described M equals described N, and described N gets the integer value being more than or equal to 1.
In an embodiment of the present invention, described tracking server obtains respectively at N number of different time and comprises with the user profile of this mobile terminal in same position regional extent:
Tracking server by the time of specifying, described mobile terminal this time positional information and be used for determining that the radius parameter of described band of position scope issues operator's location server;
Tracking server receives the response message of described operator location server feedback, and described response message comprises the user profile in same position regional extent in described time and described mobile terminal that described operator location server is determined; Described band of position scope is centered by described positional information, the region that described radius parameter covers for radius.
In an embodiment of the present invention, described tracking server, after determining suspect, also comprises:
Described suspect is mated in history suspect list, the suspect occurred in described history suspect list is defined as emphasis suspect; Suspect's information of crime history is had before storing in described history suspect list.
In order to solve the problem, present invention also offers a kind of method for tracing, comprising:
Mobile terminal sends stolen notice to tracking server when judging that self is stolen;
The stolen notice that tracking server mobile terminal receive reports;
The user that tracking server obtains with this mobile terminal in same position regional extent respectively at N number of different time believes;
The user that occurrence number in N acquisition result is more than or equal to M time is defined as suspect by tracking server; Described M is less than or equal to described N.
In order to solve the problem, present invention also offers a kind of tracking server, comprise information receiving module, tracking of information module and message processing module;
Described information receiving module is used for the stolen notice that mobile terminal receive reports;
Described tracking of information module is used for after described information receiving module receives described stolen notice, obtains respectively and the user profile of described mobile terminal in same position regional extent at N number of different time;
Described message processing module is defined as suspect for the user described tracking of information module occurrence number in N acquisition result being more than or equal to M time, and described M is less than or equal to described N.
In an embodiment of the present invention, also comprise strategy setting module, evidence obtaining starts module and information storage module;
Described strategy setting module receives the evidence obtaining strategy formulated for described mobile terminal before being used for the stolen notice reported at described information receiving module mobile terminal receive;
Described evidence obtaining starts module and is used for after described information receiving module receives the stolen notice of described mobile terminal reporting, issues corresponding evidence obtaining instruction collect evidence with the evidence obtaining function of opening described mobile terminal corresponding according to described evidence obtaining strategy to described mobile terminal;
Described information storage module stores the evidence obtaining response message of described mobile terminal feedback for receiving, described evidence obtaining response message comprises evidence obtaining content.
In an embodiment of the present invention, described evidence obtaining strategy comprise recording, take pictures, make a video recording, at least one in remote call-in.
In an embodiment of the present invention, also comprise alarm module, for after described information receiving module is used for the stolen notice that reports of mobile terminal receive, the associated user to preset described mobile terminal sends for notifying the warning information that described mobile terminal is stolen.
In an embodiment of the present invention, described tracking of information module obtains respectively at N number of different time and comprises with the user profile of described mobile terminal in same position regional extent:
Described tracking of information module by the time of specifying, described mobile terminal this time positional information and be used for determining that the radius parameter of described band of position scope issues operator's location server;
Described tracking of information module receives the response message of described operator location server feedback, and described response message comprises the user profile in same position regional extent in described time and described mobile terminal that described operator location server is determined; Described band of position scope is centered by described positional information, the region that described radius parameter covers for radius.
In an embodiment of the present invention, also comprising information sifting module, for described suspect being mated in history suspect list, the suspect occurred in described history suspect list being defined as emphasis suspect; Suspect's information of crime history is had before storing in described history suspect list.
In order to solve the problem, present invention also offers a kind of tracing system, comprise mobile terminal and tracking server as above; Stolen notice is sent to tracking server when described mobile terminal is for judging that self is stolen;
Described tracking server is used for the stolen notice that mobile terminal receive reports; Obtain respectively and the user profile of this mobile terminal in same position regional extent at N number of different time; And user occurrence number in N acquisition result being more than or equal to M time is defined as suspect; Described M is less than or equal to described N.
The invention has the beneficial effects as follows:
Method for tracing provided by the invention, tracking server and tracing system, send stolen notice when mobile terminal judges that self is stolen to tracking server; After the stolen notice that tracking server mobile terminal receive reports, obtain respectively and the user profile of this mobile terminal in same position regional extent at N number of different time, and user occurrence number in N acquisition result being more than or equal to M time is defined as suspect.Once suspect confirms, in follow-up tracing process, even if stolen mobile terminal due to do not have electricity or do not have the factors such as signal cause can not normally reporting position information time, the present invention directly can follow the trail of to be given for change by mobile terminal to the suspect determined, does not rely on mobile terminal and need reporting position information in whole final process.Therefore can improve success rate and efficiency that stolen mobile terminal is successfully recovered, reduce the potential safety hazard of stolen mobile terminal user as far as possible.
Accompanying drawing explanation
The method for tracing schematic flow sheet one that Fig. 1 provides for the embodiment of the present invention one;
The method for tracing schematic flow sheet two that Fig. 2 provides for the embodiment of the present invention one;
The communication system architecture schematic diagram that Fig. 3 provides for the embodiment of the present invention three;
The mobile terminal alarm processing schematic diagram that Fig. 4 provides for the embodiment of the present invention three;
The schematic flow sheet of the determination suspect that Fig. 5 provides for the embodiment of the present invention three;
The schematic flow sheet that suspect is positioned that Fig. 6 provides for the embodiment of the present invention three;
The schematic flow sheet that the releasing mobile terminal that Fig. 7 provides for the embodiment of the present invention three is stolen;
The mobile terminal forensics process schematic diagram that Fig. 8 provides for the embodiment of the present invention three.
Embodiment
By reference to the accompanying drawings the present invention is described in further detail below by embodiment.
Embodiment one:
Please refer to shown in Fig. 1, the method for tracing that the present embodiment provides comprises:
Step 11: send stolen notice to tracking server when mobile terminal judges that self is stolen;
Step 12: the stolen notice that tracking server mobile terminal receive reports;
Step 13: tracking server obtains and the user profile of this mobile terminal in same position regional extent respectively at N number of different time, and N gets the integer value being more than or equal to 1;
Step 14: the user that occurrence number in N acquisition result is more than or equal to M time is defined as suspect by tracking server; Institute M gets and is more than or equal to 1, is less than or equal to the integer value of N.
Should be understood that, in the present embodiment, the value of the value of N and the M of correspondence specifically can be arranged according to embody rule scene flexibly.And within the specific limits, the value of N and M is larger, the accuracy rate of the suspect finally determined is also higher.In the present embodiment, when arranging the value of N and M, except considering to obtain except higher accuracy rate as far as possible, also can in conjunction with determining that suspicion human efficiency considers.Therefore, now the value of N and M meets can obtain higher accuracy rate and efficiency simultaneously.In the present embodiment, preferred setting is got M and is equaled N, is also about to obtain at N time the user all occurred in result and is defined as suspect.Certainly, equaling except N except arranging M, M also can being set in theory for being less than or equal to N, being more than or equal to the arbitrary value between 1, such as, M can be set and equal N-1 etc.
In above-mentioned steps 11, according to the antitheft strategy preset, mobile terminal can judge that whether self is stolen.Such as, when mobile terminal has monitored SIM card replacing, can be judged to be stolen; Again such as, when mobile terminal monitor unlock continuously number of times exceed setting threshold time, be then judged to be stolen, unlocking manner herein can be unlock password, figure unlocks or unlocked by fingerprint etc.In a step 11, mobile terminal, when sending stolen notice to tracking server, also can comprise the current positional information of mobile terminal in this stolen notice further; This positional information can be that mobile terminal oneself location obtains.
In above-mentioned steps 13, N number of different time can be specifically N number of different time point, such as, and 10 points, 11 points, 12 points, 13 points, 14 5 different time points; Also can be N number of different time range, such as, 10 o'clock 10 minutes to 11 o'clock, 11 o'clock 10 minutes to 12 o'clock, 12 o'clock 10 minutes to 13 o'clock, 13 o'clock 10 minutes to 14 o'clock, 14: 10 to 15 5 different time ranges.Concrete select time point or time range, the concrete value of time point and time range and the setting of number all can be arranged according to concrete application scenarios flexibly, even according to the situation of change setup times point of mobile terminal current location or time range, can not repeat them here in the present embodiment.
In above-mentioned steps 13, tracking server obtains respectively at N number of different time and comprises with the user profile of this mobile terminal in same position regional extent:
Tracking server by the fixed time, mobile terminal this time positional information and be used for determining that the radius parameter of band of position scope issues operator's location server;
Operator's location server is determined at the appointed time, with the user profile of mobile terminal user in same position regional extent;
User profile herein can be simple Subscriber Number; Also can be get user profile more comprehensively according in the Subscriber Number determined to provider customer's system, the even current address of user name, sex, ID card No. and photographic intelligence etc. can be comprised; In the present embodiment, it can be simple Subscriber Number that operator's location server issues the user profile chasing after middle server; When tracking server needs more detailed information, also can directly by obtaining with provider customer's system interaction;
Tracking server receives the response message of operator location server feedback, this response message comprise that operator's location server determines at the appointed time with the user profile of mobile terminal in same position regional extent; Band of position scope in the present embodiment is centered by the positional information that mobile terminal is current, take radius parameter as the region that radius covers.
Shown in Figure 2, the present embodiment, after above-mentioned steps 14, also can comprise further:
Step 15: the suspect obtained mated in history suspect list, is defined as emphasis suspect by the suspect occurred in history suspect list; Suspect's information of crime history is had before storing in history suspect list herein.Directly can determine that in the suspect tentatively determined, which is habitual offender, can carry out emphasis tracking for habitual offender like this; Accuracy rate and the efficiency of tracking can be promoted further.
In the present embodiment, except determining suspect by the way, in order to be more conducive to the tracking to suspect, stolen mobile terminal also can be utilized to collect evidence.Therefore, before the stolen notice that tracking server mobile terminal receive reports, also can comprise:
Receive the evidence obtaining strategy formulated for this mobile terminal; Evidence obtaining strategy in the present embodiment can comprise recording, takes pictures, makes a video recording, at least one in remote call-in etc.; Strategy of such as collecting evidence can be takes pictures, makes a video recording or records, and also can be and records+take pictures+remote call-in or recording+shooting etc.
Tracking server after the stolen notice receiving mobile terminal reporting, then can issue corresponding evidence obtaining instruction according to the evidence obtaining strategy preset before this mobile terminal to mobile terminal and collect evidence with the evidence obtaining function of opening mobile terminal corresponding; Such as when strategy of collecting evidence is for taking pictures, then issue to mobile terminal evidence obtaining instruction of taking pictures, namely mobile terminal starts camera function and takes pictures after receiving this instruction, and to tracking server feedback evidence obtaining response message, this evidence obtaining response message comprises evidence obtaining content, such as, take pictures, recording substance or shooting content etc.
Receive and the evidence obtaining response message of memory mobile terminal feedback; This evidence obtaining response message also can be sent to other platforms according to the needs of follow-up tracking and utilize, such as, issue alarm platform etc.
Remote call-in in the present embodiment can be set as some specific communication systems of remote call-in, also can set the associated user of the preset mobile terminal of remote call-in; Such as communication system herein can be intelligent network conference system (by the incoming call of specific meeting access code), now by intelligent network, this calling is linked into conference system, controlled by conference system, intelligent network can provide function of voice communication.In the present embodiment, the associated user of mobile terminal refers to the targeted customer for this mobile terminal is arranged targetedly, after this mobile terminal is stolen, can send the relevant information of mobile terminal, such as state information, positional information etc. to this kind of targeted customer.Targeted customer in the present embodiment can be mobile phone users self (now mobile terminal stolen after, just can receive relevant information after needing number picked up), also can be other users.
In the present embodiment, according to above-mentioned antitheft strategy, mobile terminal can judge that whether self is stolen; But this result of determination not necessarily entirely accurate, therefore, receive the stolen notice of mobile terminal reporting in tracking server after, can send for notifying the warning information that this mobile terminal is stolen to the associated user of preset mobile terminal.This warning information not only can reminding user mobile terminal stolen; Also can play confirmation effect, also namely allow user confirm that whether mobile terminal is really stolen further according to this warning information.Therefore, the warning information in the present embodiment can comprise mobile terminal send stolen notice time positional information, according to this positional information, user can accurately confirm that whether this mobile terminal stolen further.As user also confirm that mobile terminal is stolen according to this warning information time, trace instruction can be sent to tracking server; Tracking server only after receiving the trace instruction that associated user issues according to warning information, just can be enabled in N number of different time and obtains the user profile with this mobile terminal in same position regional extent respectively and/or issue corresponding evidence obtaining instruction according to strategy of collecting evidence to mobile terminal.
It should be noted that the warning information that in the present embodiment, tracking server sends to associated user can be sent to sms center by short message interface machine, then send to associated user by sms center; Also can by special portal server on corresponding webpage or APP in dedicating associated user to.Corresponding, associated user and mobile phone users itself also realize the information interaction of tracking server by note or portal server.Such as, mobile phone users can set the evidence obtaining strategy of its correspondence by portal server, then by portal server, the evidence obtaining strategy set is issued tracking server; Again such as, associated user can pass through sms center, utilizes short message interface machine to send trace instruction to tracking server.Certainly, evidence obtaining strategy also utilizes short message interface machine to send to tracking server by sms center, and accordingly, the webpage that trace instruction user also provides by portal server or APP are directly handed down to tracking server.
Should be understood that, the various data (strategy of such as collecting evidence, evidence obtaining response message, user profile, mobile terminal current state etc.) that in the present embodiment, tracking server stores can be stored in local data base, also can be stored in remote data base, or be stored in local data base and simultaneously back-up storage in remote data base.
In the present embodiment, tracking server after getting suspect's information, can by suspect's information of acquisition by note or portal server in dedicating user to; User can determine whether based on concrete suspect's information to initiate to report to the police.And user can select to position tracking at least one suspect in these suspects; Specifically realize the location to suspect alternately by tracking server and operator's location server.
In the present embodiment, after mobile terminal is recovered, also comprise mobile terminal releasing process.Mode specifically by portal server or note sends for notifying that mobile terminal is recovered notice by what recover to tracking server;
Tracking server receives after this recovers notice, is recovered by the status modifier of this mobile terminal or normally; And send stolen releasing instruction by portal server or short message mode to this mobile phone users;
Mobile terminal removes stolen state after receiving this stolen releasing instruction, recovers normal condition.
Embodiment two:
Present embodiments provide a kind of tracing system, comprise mobile terminal and tracking server; Stolen notice is sent to tracking server when mobile terminal is for judging that self is stolen;
Tracking server for receive mobile terminal reporting stolen notice after, obtain and the user profile of this mobile terminal in same position regional extent respectively in N number of time range different time, N gets the integer value being more than or equal to 1; And user occurrence number in N acquisition result being more than or equal to M time is defined as suspect; M gets and is more than or equal to 1, is less than or equal to the integer value of N.
Should be understood that, in the present embodiment, the value of the value of N and the M of correspondence specifically can be arranged according to embody rule scene flexibly.And within the specific limits, the value of N and M is larger, the accuracy rate of the suspect finally determined is also higher.In the present embodiment, when arranging the value of N and M, except considering to obtain except higher accuracy rate as far as possible, also can in conjunction with determining that suspicion human efficiency considers.Therefore, now the value of N and M meets can obtain higher accuracy rate and efficiency simultaneously.In the present embodiment, preferred setting is got M and is equaled N, is also about to obtain at N time the user all occurred in result and is defined as suspect.Certainly, equaling except N except arranging M, M also can being set in theory for being less than or equal to N, being more than or equal to the arbitrary value between 1, such as, M can be set and equal N-1 etc.
According to the antitheft strategy preset, mobile terminal can judge that whether self is stolen.Such as, when mobile terminal has monitored SIM card replacing, can be judged to be stolen; Again such as, when mobile terminal monitor unlock continuously number of times exceed setting threshold time, be then judged to be stolen, unlocking manner herein can be unlock password, figure unlocks or unlocked by fingerprint etc.Mobile terminal, when sending stolen notice to tracking server, also can comprise the current positional information of mobile terminal in this stolen notice further; This positional information can be that mobile terminal oneself location obtains.
In the present embodiment, N number of different time can be specifically N number of different time point, such as, and 10 points, 11 points, 12 points, 13 points, 14 5 different time points; Also can be N number of different time range, such as, 10 o'clock 10 minutes to 11 o'clock, 11 o'clock 10 minutes to 12 o'clock, 12 o'clock 10 minutes to 13 o'clock, 13 o'clock 10 minutes to 14 o'clock, 14: 10 to 15 5 different time ranges.Concrete select time point or time range, the concrete value of time point and time range and the setting of number all can be arranged according to concrete application scenarios flexibly, even according to the situation of change setup times point of mobile terminal current location or time range, can not repeat them here in the present embodiment.
Concrete, the tracking server in the present embodiment comprises information receiving module, tracking of information module and message processing module;
Information receiving module is used for the stolen notice that mobile terminal receive reports;
Tracking of information module is used for after information receiving module receives stolen notice, obtains and the user profile of mobile terminal in same position regional extent respectively in N number of time range different time;
Message processing module is defined as suspect for user tracking of information module occurrence number in N acquisition result being more than or equal to M time.
In the present embodiment, tracking of information module obtains respectively and comprises with the user profile of mobile terminal in same position regional extent in N number of time range different time:
Tracking of information module by the time of specifying, mobile terminal this time positional information and be used for determining that the radius parameter of band of position scope issues operator's location server;
Operator's location server is determined at the appointed time, with the user profile of mobile terminal user in same position regional extent;
User profile herein can be simple Subscriber Number; Also can be get user profile more comprehensively according in the Subscriber Number determined to provider customer's system, the even current address of user name, sex, ID card No. and photographic intelligence etc. can be comprised; In the present embodiment, it can be simple Subscriber Number that operator's location server issues the user profile chasing after middle server; When tracking server needs more detailed information, also can directly by obtaining with provider customer's system interaction;
Tracking of information module receives the response message of operator location server feedback, this response message comprise that operator's location server determines at the appointed time with the user profile of mobile terminal in same position regional extent; Band of position scope in the present embodiment is centered by the positional information that mobile terminal is current, take radius parameter as the region that radius covers.
In order to promote accuracy rate and the efficiency of tracking further, also can the suspect's information obtained be screened.Now tracking server also comprises information sifting module, for the suspect obtained being mated in history suspect list, the suspect occurred in history suspect list is defined as emphasis suspect; Suspect's information of crime history is had before storing in history suspect list.Directly can determine that in the suspect tentatively determined, which is habitual offender, can carry out emphasis tracking for habitual offender like this.
In the present embodiment, in order to be more conducive to the tracking to suspect, stolen mobile terminal also can be utilized to collect evidence.Tracking server in the present embodiment also comprises strategy setting module, evidence obtaining starts module and information storage module;
Before strategy setting module is used for the stolen notice reported at information receiving module mobile terminal receive, receive the evidence obtaining strategy formulated for mobile terminal; Evidence obtaining strategy in the present embodiment can comprise recording, takes pictures, makes a video recording, at least one in remote call-in etc.; Strategy of such as collecting evidence can be takes pictures, makes a video recording or records, and also can be and records+take pictures+remote call-in or recording+shooting etc.;
Evidence obtaining starts module and is used for after information receiving module receives the stolen notice of mobile terminal reporting, issues corresponding evidence obtaining instruction collect evidence with the evidence obtaining function of opening mobile terminal corresponding according to preset evidence obtaining strategy to mobile terminal; Such as when strategy of collecting evidence is for taking pictures, then issue to mobile terminal evidence obtaining instruction of taking pictures, namely mobile terminal starts camera function and takes pictures after receiving this instruction, and to tracking server feedback evidence obtaining response message, this evidence obtaining response message comprises evidence obtaining content, such as, take pictures, recording substance or shooting content etc.
Information storage module is for receiving the evidence obtaining response message of memory mobile terminal feedback, and evidence obtaining response message comprises evidence obtaining content.This evidence obtaining response message also can be sent to other platforms according to the needs of follow-up tracking and utilize, such as, issue alarm platform etc.
Remote call-in in the present embodiment can be set as some specific communication systems of remote call-in, also can set the associated user of the preset mobile terminal of remote call-in; Such as communication system herein can be intelligent network conference system (by the incoming call of specific meeting access code), now by intelligent network, this calling is linked into conference system, controlled by conference system, intelligent network can provide function of voice communication.In the present embodiment, the associated user of mobile terminal refers to the targeted customer for this mobile terminal is arranged targetedly, after this mobile terminal is stolen, can send the relevant information of mobile terminal, such as state information, positional information etc. to this kind of targeted customer.Targeted customer in the present embodiment can be mobile phone users self (now mobile terminal stolen after, just can receive relevant information after needing number picked up), also can be other users.
In the present embodiment, according to above-mentioned antitheft strategy, mobile terminal can judge that whether self is stolen; But this result of determination not necessarily entirely accurate, therefore, receive the stolen notice of mobile terminal reporting in tracking server after, the alarm module that can be comprised by it is sent for notifying the warning information that this mobile terminal is stolen to the associated user of preset mobile terminal.This warning information not only can reminding user mobile terminal stolen; Also can play confirmation effect, also namely allow user confirm that whether mobile terminal is really stolen further according to this warning information.Therefore, the warning information in the present embodiment can comprise mobile terminal send stolen notice time positional information, according to this positional information, user can accurately confirm that whether this mobile terminal stolen further.As user also confirm that mobile terminal is stolen according to this warning information time, trace instruction can be sent to tracking server; Tracking server only after receiving the trace instruction that associated user issues according to warning information, just can be enabled in N number of different time and obtains the user profile with this mobile terminal in same position regional extent respectively and/or issue corresponding evidence obtaining instruction according to strategy of collecting evidence to mobile terminal.
It should be noted that the warning information that in the present embodiment, tracking server sends to associated user can be sent to sms center by short message interface machine, then send to associated user by sms center; Also can by special portal server on corresponding webpage or APP in dedicating associated user to.Corresponding, associated user and mobile phone users itself also realize the information interaction of tracking server by note or portal server.Such as, mobile phone users can arrange the evidence obtaining strategy of its correspondence by portal server, then by portal server, the evidence obtaining strategy set is issued tracking server; Again such as, associated user can pass through sms center, utilizes short message interface machine to send trace instruction to tracking server.Certainly, evidence obtaining strategy also utilizes short message interface machine to send to tracking server by sms center, and accordingly, the webpage that trace instruction user also provides by portal server or APP are directly handed down to tracking server.
Should be understood that, the various data (strategy of such as collecting evidence, evidence obtaining response message, user profile, mobile terminal current state etc.) that in the present embodiment, tracking server stores can be stored in local data base, also can be stored in remote data base, or be stored in local data base and simultaneously back-up storage in remote data base.
In the present embodiment, tracking server after getting suspect's information, can by suspect's information of acquisition by note or portal server in dedicating user to; User can determine whether based on concrete suspect's information to initiate to report to the police.
In the present embodiment, after mobile terminal is recovered, also comprise mobile terminal releasing process.Mode specifically by portal server or note sends for notifying that mobile terminal is recovered notice by what recover to tracking server; Tracking server receives after this recovers notice, is recovered by the status modifier of this mobile terminal or normally; And send stolen releasing instruction by portal server or short message mode to this mobile phone users; Mobile terminal removes stolen state after receiving this stolen releasing instruction, recovers normal condition.
Embodiment three:
The present embodiment is for a kind of embody rule scene, and the present invention is described further.Communication system shown in Figure 3, tracing system comprises mobile terminal 101, tracking server 102, short message interface machine 103, portal server 104, terminal APP105, conference system 106, database 107, externally also comprise docking operator location server 108, provider customer's system 109, sms center 110 and warning system; Wherein:
Mobile terminal 101: have take pictures, shoot the video, record, the function such as remote call-in, the positional information at self place of mobile terminal 101 can be provided in time, and when being in stolen state under anti-theft modes, according to setting situation, the information (comprising positional information, video, photo, recording etc.) obtained is reported to tracking server, and visual setting evidence obtaining strategy judges whether to initiate remote call-in function;
Tracking server 102: the information (positional information, video, recording, photo etc.) being mainly used in mobile terminal to upload is preserved, and can specifically judge whether mobile terminal is in stolen state according to the situation of mobile terminal reporting, if be in stolen state, short message alarm can be carried out to the associated user of mobile terminal in time; And in good time following function can be initiated, and ask operator's (can multi-operator be docked) to provide N number of different time points and this mobile terminal to be in same position in time to differ the user profile being no more than setpoint distance, according to the user profile that operator returns, if mobile terminal exists certain same user in same area in difference (can the arrange) position of different time points all simultaneously, can judge that this user is as suspect;
Short message interface machine 103: be mainly used in docking the sms center of operator, the note for tracking server is issued be forwarded to operator sms center and time be issued to the associated user of mobile terminal; When mobile phone users is operated mobile terminal by short-message instruction, in time note is transmitted to tracking server by short message interface machine, after tracking server receives short-message instruction, issues corresponding instruction to mobile terminal in time;
Portal server 104 terminal APP105: be mainly used in positional information and the warning information of showing mobile terminal, and user issues operation instruction information, arranges mobile terminal;
Conference system 106: if remote call-in meeting access code when mobile terminal is set to stolen under anti-theft modes, then by intelligent network, call information is transferred to conference system, controlled meeting by conference system, intelligent network provides function of voice communication;
Database 107: be mainly used in data and store;
Operator's location server 108: be mainly used in positioning mobile terminal, and can according to band of position search terminal user profile;
Sms center 109: be mainly used in note descending for short message interface machine to be issued to corresponding user, and the note that user sends is forwarded to short message interface machine, by short message interface machine, the note that user sends is forwarded to tracking server and processes;
Provider customer's system 110: be mainly used in the user profile of preserving operator, can comprise at least one in Subscriber Number, user's name, user identity card number, station address and user's photograph etc.;
Warning system 111: be mainly used in, after acquisition suspect information, carrying out the stolen alert process of mobile terminal.
In the application scenarios described in Fig. 3, mobile terminal carries out, shown in alarm processing Fig. 4, comprising:
Step 401, the antitheft strategy that mobile terminal is arranged according to user be judged as stolen after, transmit stolen notice to tracking server in time, this stolen notice comprises the current positional information of mobile terminal;
Step 402, after tracking server receives the stolen notice of mobile terminal, sends stolen push-notification-answer message to mobile terminal in time;
Step 403, stolen for mobile terminal state and location message are saved in Database Systems by tracking server;
Step 404, tracking server obtains location expression information according to the positional information of mobile terminal reporting to portal server;
Step 405, portal server is to tracking server home position descriptor;
Step 406, tracking server, according to the stolen alarm message of system configuration scenarios movement of tissue terminal, sends to short message interface machine;
Step 407, after short message interface machine receives alarm message, forwards to sms center;
Step 408, after sms center receives note, the associated user to mobile terminal issues alarm message;
Shown in Figure 5, determine that the process of suspect's information comprises:
Step 501, keeper by portal server selected stolen mobile terminal on corresponding webpage, and sends to tracking server the same area user obtained with residing for mobile terminal ask according to up-to-date positional information, the temporal information reported of mobile terminal;
Step 502, positional information, temporal information, radius parameter information are sent to operator's location server after receiving the acquisition and the same area user request information residing for mobile terminal that portal server sends by tracking server;
Step 503, after operator's location server receives, according to positional information and radius information, obtain, specifying in the user in same position regional extent at time and this mobile terminal, then sending the request of the details obtaining these users to provider customer's system;
Details, after provider customer's system receives request, are returned to operator's location server by step 504;
Step 505, after location server receives User Detail, sends the details acquired to tracking server;
Step 506, tracking server is after acquisition with the User Detail in same position regional extent residing for mobile terminal, according to request number of times (the judgement number of times of Operation system setting, also can in conjunction with before obtain user profile) judge suspect's information, if current request number of times does not reach judgement times N, then repeat the step of 502 to 506; If according to the times N of Operation system setting, determine suspect's information, then stopped obtaining request;
Step 507, suspect's information of acquisition is kept in Database Systems by tracking server, and the result of acquisition is returned to portal server;
Step 508, portal server shows acquisition suspect object information in time, and can be reported to the police to public security system in time by warning system in time.
Shown in Figure 6, the process that suspect positions is comprised:
Step 601, portal server chooses suspect's information on door, initiates suspect location or track and localization request to tracking server;
Step 602, after tracking server receives suspect's Location Request, after Location Request being converted to the positioning format of operator's location server needs, sends Location Request to operator's location server;
Step 603, the positional information of designated user, after getting Location Request, is sent to tracking server by operator's location server;
Step 604, tracking server sends positioning result to portal server after getting position result;
Step 605, positioning result, after getting positioning result, carries out preserving and showing by portal server, and according to user arrange location or track and localization request, determine whether need again to tracking server initiate Location Request; If need to initiate Location Request, then repeat 601 to 605 steps; If do not need again to locate, then flow process terminates.
Shown in Figure 7, remove stolen flow process in the present embodiment and comprise:
Step 701, warning system sends to portal server specifies mobile terminal by the notice given for change;
Step 702, after portal server receives this notice, sends response message to warning system;
Step 703, portal server to tracking server transmitting terminal by the message informing recovered;
Step 704, tracking server sends response message to portal server;
Step 705, this status information of mobile terminal is revised as normal condition and is saved to database by tracking server;
Step 706, tracking server organizes notifying messages information according to system set-up information, sends mobile terminal by the SMS notification recovered to short message interface machine;
Step 707, SMS notification is forwarded to sms center by short message interface machine;
Step 708, SMS notification is transmitted to mobile terminal associated user by sms center;
Step 709, tracking server, according to the protocol information with mobile terminal, issues stolen releasing instruction to mobile terminal,
Step 710, mobile terminal removes stolen state after receiving stolen releasing instruction, recovers normal condition;
Shown in Figure 8, the forensics process that the present embodiment provides comprises:
Step 801, user is after mobile station define, the evidence obtaining strategy of mobile terminal acquiescence comprises recording, the page that user can provide at portal server carries out tactful concrete setting of collecting evidence, arrange evidence obtaining policing option to comprise: recording, shooting, photograph, remote call-in, after user sets Evidence model on door, click after preserving, portal server sends evidence obtaining strategy to tracking server;
Step 802, tracking server, after the evidence obtaining strategy setting receiving portal server transmission, sends response message to portal server;
Step 803, evidence obtaining strategy is saved to database by tracking server;
Step 804, evidence obtaining strategy, according to the communication protocol with mobile terminal, is converted to the evidence obtaining instruction that mobile terminal can identify and is issued to mobile terminal by tracking server;
Step 805, mobile terminal sends response message to tracking server after receiving evidence obtaining instruction; If terminal is in stolen pattern, then enter step 806, otherwise flow process terminates;
Step 806, mobile terminal is in stolen pattern, in time according to evidence obtaining instruction, carries out taking pictures, records, makes a video recording, the evidence obtaining function such as calling, after collect evidence, to collect evidence object information to tracking server transmission;
Step 807, tracking server, after receiving the evidence obtaining object information that mobile terminal uploads, sends response message to mobile terminal;
Step 808, tracking server feeds back this information to portal server after receiving evidence obtaining object information;
Step 809, after portal server receives evidence obtaining object information, send response to tracking server, now user or system manager can check evidence obtaining object information in time.
Above content is in conjunction with concrete execution mode further description made for the present invention, can not assert that specific embodiment of the invention is confined to these explanations.For general technical staff of the technical field of the invention, without departing from the inventive concept of the premise, some simple deduction or replace can also be made, all should be considered as belonging to protection scope of the present invention.

Claims (17)

1. a method for tracing, is characterized in that, comprising:
The stolen notice that tracking server mobile terminal receive reports;
Tracking server obtains and the user profile of described mobile terminal in same position regional extent respectively at N number of different time;
Tracking server is less than or equal to described N by being defined as M described in suspect the user obtaining occurrence number in result for N time and be more than or equal to M time.
2. method for tracing as claimed in claim 1, is characterized in that, before the stolen notice that described tracking server mobile terminal receive reports, also comprise:
Receive the evidence obtaining strategy formulated for described mobile terminal;
Described tracking server, after the stolen notice receiving described mobile terminal reporting, also comprises:
Issue corresponding evidence obtaining instruction according to described evidence obtaining strategy to described mobile terminal to collect evidence with the evidence obtaining function of opening described mobile terminal corresponding;
Receive the evidence obtaining response message of described mobile terminal feedback; Described evidence obtaining response message comprises evidence obtaining content.
3. method for tracing as claimed in claim 2, is characterized in that, described evidence obtaining strategy comprises recording, takes pictures, makes a video recording, at least one in remote call-in.
4. method for tracing as claimed in claim 2, it is characterized in that, described tracking server, after receiving the stolen notice of described mobile terminal reporting, also comprises: the associated user to preset described mobile terminal sends for notifying the warning information that described mobile terminal is stolen.
5. method for tracing as claimed in claim 4, it is characterized in that, described tracking server, when receiving the stolen notice of described mobile terminal reporting, before sending described warning information, also comprises and obtains the current positional information of described mobile terminal to described associated user; Described positional information is comprised in described warning information.
6. method for tracing as claimed in claim 4, it is characterized in that, described tracking server, after receiving the trace instruction that described associated user issues according to described warning information, just obtains user profile with this mobile terminal in same position regional extent respectively at N number of different time and/or tactfully issues corresponding evidence obtaining instruction to described mobile terminal according to described evidence obtaining.
7. the method for tracing as described in any one of claim 1-6, is characterized in that, described M equals described N, and described N gets the integer value being more than or equal to 1.
8. the method for tracing as described in any one of claim 1-6, is characterized in that, described tracking server obtains respectively at N number of different time and comprises with the user profile of this mobile terminal in same position regional extent:
Tracking server by the time of specifying, described mobile terminal this time positional information and be used for determining that the radius parameter of described band of position scope issues operator's location server;
Tracking server receives the response message of described operator location server feedback, and described response message comprises the user profile in same position regional extent in described time and described mobile terminal that described operator location server is determined; Described band of position scope is centered by described positional information, the region that described radius parameter covers for radius.
9. the method for tracing as described in any one of claim 1-6, is characterized in that, described tracking server, after determining suspect, also comprises:
Described suspect is mated in history suspect list, the suspect occurred in described history suspect list is defined as emphasis suspect; Suspect's information of crime history is had before storing in described history suspect list.
10. a method for tracing, is characterized in that, comprising:
Mobile terminal sends stolen notice to tracking server when judging that self is stolen;
The stolen notice that tracking server mobile terminal receive reports;
Tracking server obtains and the user profile of this mobile terminal in same position regional extent respectively at N number of different time;
The user that occurrence number in N acquisition result is more than or equal to M time is defined as suspect by tracking server; Described M is less than or equal to described N.
11. 1 kinds of tracking server, is characterized in that, comprise information receiving module, tracking of information module and message processing module;
Described information receiving module is used for the stolen notice that mobile terminal receive reports;
Described tracking of information module is used for after described information receiving module receives described stolen notice, obtains respectively and the user profile of described mobile terminal in same position regional extent at N number of different time;
Described message processing module is defined as suspect for the user described tracking of information module occurrence number in N acquisition result being more than or equal to M time; Described M is less than or equal to described N.
12. tracking server as claimed in claim 11, is characterized in that, also comprise strategy setting module, evidence obtaining starts module and information storage module;
Described strategy setting module receives the evidence obtaining strategy formulated for described mobile terminal before being used for the stolen notice reported at described information receiving module mobile terminal receive;
Described evidence obtaining starts module and is used for after described information receiving module receives the stolen notice of described mobile terminal reporting, issues corresponding evidence obtaining instruction collect evidence with the evidence obtaining function of opening described mobile terminal corresponding according to described evidence obtaining strategy to described mobile terminal;
Described information storage module stores the evidence obtaining response message of described mobile terminal feedback for receiving, described evidence obtaining response message comprises evidence obtaining content.
13. tracking server as claimed in claim 12, is characterized in that, described evidence obtaining strategy comprises recording, takes pictures, makes a video recording, at least one in remote call-in.
14. tracking server as claimed in claim 12, it is characterized in that, also comprise alarm module, for after described information receiving module is used for the stolen notice that reports of mobile terminal receive, the associated user to preset described mobile terminal sends for notifying the warning information that described mobile terminal is stolen.
15. tracking server as described in any one of claim 11-14, it is characterized in that, described tracking of information module obtains respectively at N number of different time and comprises with the user profile of described mobile terminal in same position regional extent:
Described tracking of information module by the time of specifying, described mobile terminal this time positional information and be used for determining that the radius parameter of described band of position scope issues operator's location server;
Described tracking of information module receives the response message of described operator location server feedback, and described response message comprises the user profile in same position regional extent in described time and described mobile terminal that described operator location server is determined; Described band of position scope is centered by described positional information, the region that described radius parameter covers for radius.
16. tracking server as described in any one of claim 11-14, it is characterized in that, also comprising information sifting module, for described suspect being mated in history suspect list, the suspect occurred in described history suspect list being defined as emphasis suspect; Suspect's information of crime history is had before storing in described history suspect list.
17. 1 kinds of tracing systems, is characterized in that, comprise mobile terminal and the tracking server as described in any one of claim 11-16; Stolen notice is sent to tracking server when described mobile terminal is for judging that self is stolen;
Described tracking server is used for the stolen notice that mobile terminal receive reports; Obtain respectively and the user profile of this mobile terminal in same position regional extent at N number of different time; And user occurrence number in N acquisition result being more than or equal to M time is defined as suspect; Described M is less than or equal to described N.
CN201410351565.4A 2014-07-23 2014-07-23 Tracking method, tracking server, and tracking system Pending CN105282700A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201410351565.4A CN105282700A (en) 2014-07-23 2014-07-23 Tracking method, tracking server, and tracking system
PCT/CN2014/086553 WO2015117315A1 (en) 2014-07-23 2014-09-15 Tracking method, tracking server and tracking system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410351565.4A CN105282700A (en) 2014-07-23 2014-07-23 Tracking method, tracking server, and tracking system

Publications (1)

Publication Number Publication Date
CN105282700A true CN105282700A (en) 2016-01-27

Family

ID=53777146

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410351565.4A Pending CN105282700A (en) 2014-07-23 2014-07-23 Tracking method, tracking server, and tracking system

Country Status (2)

Country Link
CN (1) CN105282700A (en)
WO (1) WO2015117315A1 (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106792544A (en) * 2017-01-12 2017-05-31 维沃移动通信有限公司 A kind of method and terminal for detecting terminal location
CN108810239A (en) * 2017-12-24 2018-11-13 湛江正信科技服务有限公司 Method, apparatus, intelligent terminal and the storage medium that intelligent terminal is recovered
CN108881342A (en) * 2017-05-11 2018-11-23 京东方科技集团股份有限公司 A kind of target tracking method and target tracking system
CN111311876A (en) * 2020-02-26 2020-06-19 上海立可芯半导体科技有限公司 Tracking method and system based on wireless network
CN112073906A (en) * 2020-09-29 2020-12-11 中国银行股份有限公司 Method and device for searching equipment, electronic equipment and storage medium
CN112312322A (en) * 2019-07-31 2021-02-02 浙江宇视科技有限公司 Safety protection method and device based on wireless detection

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020065628A1 (en) * 2018-09-28 2020-04-02 Akuon Peter Mobile node neighbor identity register apparatus and method

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102509033A (en) * 2011-09-26 2012-06-20 宇龙计算机通信科技(深圳)有限公司 Processing method of communication terminal after being stolen and communication terminal
CN103037310A (en) * 2012-12-14 2013-04-10 北京网秦天下科技有限公司 Mobile terminal intelligent anti-theft method and mobile terminal
CN103618996A (en) * 2013-12-13 2014-03-05 北京奇虎科技有限公司 Position data processing method, client and server

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102509033A (en) * 2011-09-26 2012-06-20 宇龙计算机通信科技(深圳)有限公司 Processing method of communication terminal after being stolen and communication terminal
CN103037310A (en) * 2012-12-14 2013-04-10 北京网秦天下科技有限公司 Mobile terminal intelligent anti-theft method and mobile terminal
CN103618996A (en) * 2013-12-13 2014-03-05 北京奇虎科技有限公司 Position data processing method, client and server

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106792544A (en) * 2017-01-12 2017-05-31 维沃移动通信有限公司 A kind of method and terminal for detecting terminal location
CN108881342A (en) * 2017-05-11 2018-11-23 京东方科技集团股份有限公司 A kind of target tracking method and target tracking system
US10872421B2 (en) 2017-05-11 2020-12-22 Boe Technology Group Co., Ltd. Object tracking method and object tracking device
CN108810239A (en) * 2017-12-24 2018-11-13 湛江正信科技服务有限公司 Method, apparatus, intelligent terminal and the storage medium that intelligent terminal is recovered
CN112312322A (en) * 2019-07-31 2021-02-02 浙江宇视科技有限公司 Safety protection method and device based on wireless detection
CN112312322B (en) * 2019-07-31 2023-03-24 浙江宇视科技有限公司 Safety protection method and device based on wireless detection
CN111311876A (en) * 2020-02-26 2020-06-19 上海立可芯半导体科技有限公司 Tracking method and system based on wireless network
CN112073906A (en) * 2020-09-29 2020-12-11 中国银行股份有限公司 Method and device for searching equipment, electronic equipment and storage medium
CN112073906B (en) * 2020-09-29 2022-02-01 中国银行股份有限公司 Method and device for searching equipment, electronic equipment and storage medium

Also Published As

Publication number Publication date
WO2015117315A1 (en) 2015-08-13

Similar Documents

Publication Publication Date Title
CN105282700A (en) Tracking method, tracking server, and tracking system
US10446000B2 (en) Detecting an intruder's wireless device during a break in to a premises
CN101611599B (en) Apparatus and methods for locating, tracking and/or recovering a wireless communication device
CN103985230B (en) A kind of Notification Method based on image, device and notice system
CN104902225A (en) Intelligent household monitoring and antitheft system and monitoring method thereof
US20080178251A1 (en) Process and system for automatically transmitting audio/video content from an electronic device to desired recipient(s)
CN202167123U (en) Security system
US9942520B2 (en) Interactive and targeted monitoring service
CN104484985A (en) Security alarm method, terminal, police system and security alarm platform
CN104539811A (en) Anti-theft method of terminal and mobile terminal
EP2744198B1 (en) Video surveillance system using mobile terminals
CN202617350U (en) Mobile phone safety management and control system
CN106657867B (en) Mobile terminal alarm method and its device based on video monitoring system
CN205121213U (en) Firearms control management system
US20180167585A1 (en) Networked Camera
CN104077897A (en) Alarm method and system for automatic positioning
CN103841283A (en) Rapid police-sending security system
CN105354901A (en) Fingerprint identification-based children loss prevention method and device
CN108289192A (en) Police Video Supervision System with smart mobile phone alarm
CN101546467A (en) Radio alarm system and radio alarm method with early warning function
CN205264026U (en) A key alarm system based on mobile intelligent Terminal
CN111491258A (en) Object type detection method and device
CN109862523A (en) Far from tracking rescue alarm system
CN111489276B (en) Personnel management method and related device
CN114867101A (en) Method, device, system and memory for preventing loss of locatable terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20160127

WD01 Invention patent application deemed withdrawn after publication