CN106534516A - Intelligent mobile phone, theft tracking system and theft tracking method - Google Patents

Intelligent mobile phone, theft tracking system and theft tracking method Download PDF

Info

Publication number
CN106534516A
CN106534516A CN201610954394.3A CN201610954394A CN106534516A CN 106534516 A CN106534516 A CN 106534516A CN 201610954394 A CN201610954394 A CN 201610954394A CN 106534516 A CN106534516 A CN 106534516A
Authority
CN
China
Prior art keywords
mobile phone
smart mobile
module
burgled
robbed
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610954394.3A
Other languages
Chinese (zh)
Inventor
代伟佳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Feixun Data Communication Technology Co Ltd
Original Assignee
Shanghai Feixun Data Communication Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Feixun Data Communication Technology Co Ltd filed Critical Shanghai Feixun Data Communication Technology Co Ltd
Priority to CN201610954394.3A priority Critical patent/CN106534516A/en
Publication of CN106534516A publication Critical patent/CN106534516A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72409User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
    • H04M1/72412User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories using two-way short-range wireless interfaces
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/009Signalling of the alarm condition to a substation whose identity is signalled to a central station, e.g. relaying alarm signals in order to extend communication range
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/01Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
    • G08B25/016Personal emergency signalling and security systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72418User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality for supporting emergency services
    • H04M1/72421User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality for supporting emergency services with automatic activation of emergency service functions, e.g. upon sensing an alarm
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72454User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to context-related or environment-related conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W64/00Locating users or terminals or network equipment for network management purposes, e.g. mobility management

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Human Computer Interaction (AREA)
  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Environmental & Geological Engineering (AREA)
  • Computer Security & Cryptography (AREA)
  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)

Abstract

The invention relates to the field of communication and especially relates to a mobile phone anti-theft method. The invention discloses an intelligent mobile phone. The intelligent mobile phone comprises a navigation positioning module and a communication module, and further comprises an anti-theft mobile phone account bound with the intelligent mobile phone. When an anti-theft mobile phone account at a far end emits a stolen instruction to the intelligent mobile phone, the intelligent mobile phone starts the navigation positioning module and the communication module. The navigation positioning module is used for positioning longitude and latitude information of the intelligent mobile phone. The communication module used for sending the longitude and latitude information to the anti-theft mobile phone account. According to the invention, basic functions such as performing locking after theft, giving an alarm after the theft, performing whereabouts notification after the theft, making a data backup after the theft and deleting original data after the theft are provided for a theft tracking system.

Description

A kind of smart mobile phone, robbed or burgled tracing system and robbed or burgled method for tracing
Technical field
Present patent application is related to the communications field, more particularly to a kind of technical scheme of anti-theft tracking of mobile phone.
Background technology
Mobile phone antitheft technology is a current very popular technology.As mobile phone is stored with substantial amounts of privacy information, connection It is phone, log, memorandum, note, or implements with game provider, the account of propagation service supplier, password etc. Binding, or has customized the time that do not limit, the calling of region and access service, or has cell entry, Lou Men, door, does Public room door, safety cabinet, automobile, computer, " gate inhibition " open function of portable hard drive, once hand-set from stolen or loss, illegally User may bring various losses and trouble to validated user.Therefore, Mobile phone antitheft technology has wide market prospect, it is expected to into For the standard configuration of mobile phone.
With the improvement of people's living standards, the popularization more and more higher of mobile phone, the information stored in mobile phone are more and more important. After the mobile phone of prior art is lost, cellphone subscriber is usually difficult to find what is returned.At present, general mobile phone do not possess it is antitheft, Anti-lost, traceable function, even if it is also not sensitive enough to possess its reaction, therefore cannot accomplish and alarm informs that mobile phone is used Person, can not carry out real time synchronization and accurate track and localization with getting back mobile phone, or even arrest thief.
Chinese Patent Application No. is CN201110369930.0, and the invention is related to a kind of antitheft mobile phone based on Bluetooth technology Anti- loss alarming method, is wirelessly connected with the bluetooth of alarm including mobile phone is set up, and is arranged warning environmental information value, is reported to the police Distance threshold Th, detects bluetooth signal intensity value RSSI, is believed according to received signal strength value RSSI and the warning environment Breath value estimates the distance between mobile phone and alarm Dis, and when alarm distance threshold value Th is exceeded apart from Dis, triggering is reported to the police;This Bright alarm distance considers environmental factorss so that report to the police more accurately, can need setting alarm distance according to user, enter one Step ground, in the maximum transmission distance beyond Bluetooth signal, alarm or mobile phone can automatic detection triggering report to the police, and can be from It is dynamic to obtain current phone GPS information and be regularly sent to the phone number for pre-setting, and further adopt two-way detection signal The method of intensity, improves warning degree of accuracy..
Chinese Patent Application No. is CN201210089783.6, and the disclosure of the invention is a kind of to be based on mobile phone camera and GPS Realize the system and method for antitheft mobile phone, including mobile phone CPU, microprocessor, webcam driver module, input module and unblock inspection Module is surveyed, the input module is connected with unblock detection module, the unblock detection module is connected with mobile phone CPU, and mobile phone CPU leads to Cross microprocessor to be connected with webcam driver module.Compared with prior art, beneficial effect is the present invention:What the present invention was provided Mobile phone antitheft system and method are realized based on mobile phone camera and GPS, after losing or be stolen to mobile phone, is needed using during mobile phone Unblock operation to be carried out, and triggering starts the running background program being built in mobile phone when faulty operation is unlocked, by handss Machine GPS module, photographic head are positioned and are taken pictures to currently used person and found a view, while the information of acquisition is sent to user in time The mailbox specified or other addresses, facilitate user to report to the police, so allow users to promptly and accurately recover mobile phone, prevent user's handss Machine finance lose the problem with leakage of personal information..
Although patent disclosed above is directed to the warning and tracking of robbed or burgled mobile phone, it is not related in most most important mobile phone Data backup technical problem.
The content of the invention
In order to solve the technical problem that above-mentioned prior art is present, the invention provides a kind of mobile phone based on intelligent watch Anti-theft tracking technology, based on the binding between intelligent watch and mobile phone account, carries out Realtime Alerts using the intensity of Bluetooth signal, Report to the police real-time trigger message synchronization module and GPS module, carry out it is important and can not Copy Info real-time synchronization, and enter line position Confidence ceases real-time tracing, finally realizes antitheft mobile phone, synchronizing information and tracking.The present invention is to be achieved through the following technical solutions 's:
A kind of smart mobile phone, including navigation positioning module and communication module, also include anti-with smart mobile phone binding Mobile phone account is stolen, such as described antitheft mobile phone account can be arranged on the network equipment (end);
When the antitheft mobile phone account of distal end sends robbed or burgled instruction to the smart mobile phone, the smart mobile phone start described in lead Boat locating module and communication module;
The navigation positioning module, for positioning the latitude and longitude information of the smart mobile phone;
The communication module, for the latitude and longitude information is sent to the antitheft mobile phone account.
Further, described smart mobile phone, the smart mobile phone also include synchronizing information module, described information synchronization mould Block, for the user data in the smart mobile phone is synchronized to by the communication module, the antitheft mobile phone account is specified to deposit Storage space is put, and such as synchronous storage is on the network equipment.
Further, described smart mobile phone, the smart mobile phone also include lock machine module, the lock machine module, for root According to the described robbed or burgled instruction for receiving, the smart mobile phone is locked.Can generate password locking temporarily, or be exactly only to lock Fixed, only sending unlock instruction by antitheft mobile phone account could unlock.
Present invention also offers a kind of robbed or burgled tracing system:A kind of robbed or burgled tracing system based on smart mobile phone, the system System includes the smart mobile phone and intelligent watch, is stored in the intelligent handss with the antitheft mobile phone account of smart mobile phone binding In table, after the antitheft mobile phone account in the intelligent watch is logged in, remotely robbed or burgled instruction is sent to the smart mobile phone. Because wrist-watch is worn on bracelet, it is not easy to which come off loss, and mobile phone is typically placed only in trousers pocket/pocket or pocket/pocket, and Jing is often drawn out use, is easily lost or stolen.The binding of mobile phone and wrist-watch (by antitheft mobile phone account) is set, it is easier to Find that mobile phone is robbed or burgled, avoid loss in time, especially immeasurable information/data/address list loss.
Further, described robbed or burgled tracing system, the intelligent watch also include Distance Judgment module, the Distance Judgment Module, for the longitude and latitude letter for judging to be provided according to the respective navigation positioning module of the intelligent watch and the smart mobile phone Breath, calculates the distance between the two.Can also lead to by the built-in blue-tooth device of intelligent watch and mobile phone and bluetooth communication agreement Cross
Further, described robbed or burgled tracing system, the intelligent watch also include data and image analysis module, the number According to and image analysis module, for the latitude and longitude information of smart mobile phone described in real time parsing.And then reality of the realization to robbed or burgled mobile phone When follow the trail of.
Further, described robbed or burgled tracing system, the intelligent watch also include (long-range) control module, (long-range) Control module, for remote control by the data syn-chronization in the smart mobile phone to the intelligent watch.Storage is provided with intelligent watch Device.
Further, described robbed or burgled tracing system, (long-range) control module delete the smart mobile phone for remote control In data.
Further, described robbed or burgled tracing system, (long-range) control module, for sending robbed or burgled alarm signal.Than The information of " mobile phone of certain 139XXX is robbed or burgled " is such as sent to 110 robber and police centers, the longitude and latitude of the mobile phone can be further sent Information gives 110 robber and police centers.
Present invention also offers a kind of robbed or burgled method for tracing of smart mobile phone, the smart mobile phone and intelligent watch are carried out Match somebody with somebody, comprise the steps:
The latitude and longitude information of the smart mobile phone is interacted with the latitude and longitude information of the intelligent watch;
When the Distance Judgment module of the intelligent watch judges that the intelligent watch and the distance of the smart mobile phone exceed During presetting threshold value, the Distance Judgment module by the antitheft mobile phone account bound with the smart mobile phone, remotely to institute State smart mobile phone and send robbed or burgled instruction.
Further, the robbed or burgled method for tracing of smart mobile phone, (long-range) the control module remote control of the intelligent watch is by the intelligence Data syn-chronization in energy mobile phone is to the intelligent watch.
Further, the robbed or burgled method for tracing of smart mobile phone, the time module of the intelligent watch judge the intelligent watch with The synchronous time interval of the smart mobile phone, when the time module judges that the time interval is less than the time threshold, Then not log-on data synchronic command.
Further, the robbed or burgled method for tracing of smart mobile phone, (long-range) the control module remote control of the intelligent watch delete described Data in smart mobile phone.Prevent personal information from leaking, further loss is caused to former owner and is injured.
Further, the robbed or burgled method for tracing of smart mobile phone, (long-range) control module of the intelligent watch send robbed or burgled warning Signal.The information of " mobile phone of certain 139XXX is robbed or burgled " is such as sent to 110 robber and police centers, the mobile phone can be further sent Latitude and longitude information gives 110 robber and police centers.
The present invention one of at least has the advantages that:
1. instant invention overcomes former mobile phone is robbed or burgled, it is difficult to the technical problem given for change.
2. the present invention give robbed or burgled tracing system it is robbed or burgled after locking, it is robbed or burgled after report to the police, it is robbed or burgled after inform the basic of whereabouts Function.
3. this invention greatly reduces the robbed or burgled rate of mobile phone, it is to avoid cause economic loss to owner.
4. the present invention can accomplish to allow smart mobile phone, it is robbed or burgled after back up out data, it is robbed or burgled after delete former data, it is to avoid to machine Master causes further loss and injures.
5th, the robbed or burgled tracing system that the present invention is provided, reliability are high, while execution efficiency is high, applied range.
Description of the drawings
With reference to the accompanying drawings and detailed description the present invention is described in further detail:
Fig. 1 is smart mobile phone module diagram of the present invention;
Fig. 2 is first embodiment of the invention structural representation;
Fig. 3 is intelligent watch module diagram of the present invention;
Fig. 4 is second embodiment of the invention structural representation;
Fig. 5 is second embodiment of the invention schematic flow sheet;
Fig. 6 is third embodiment of the invention module diagram;
Fig. 7 is third embodiment of the invention schematic flow sheet.
Description of reference numerals
Smart mobile phone -100, navigation positioning module -110, communication module -120, (information) synchronization module -130, lock machine mould Block -140;Intelligent watch -200, navigation positioning module -210, communication module -220, (information) synchronization module -230, control mould Block -240, data and image analysis module -250, Distance Judgment module -260, time module -270, alarm device -280, storage Device -290;The network equipment -300.
Specific embodiment
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing Accompanying drawing to be used needed for having technology description is briefly described, it should be apparent that, below explanation and accompanying drawing are for the present invention Be it is exemplary, and be understood not to limit the present invention.Following description describe numerous details to facilitate to this Sensible solution.However, in some instances, well known or conventional details is not simultaneously specified, the requirement succinct to meet description.
In one typical computing hardware configuration of the application, client/terminal, the network equipment and trusted party include one Individual or multiple processors (CPU), input/output interface, network interface and internal memory.
Client, mobile terminal or the network equipment in the present invention includes processor, processes containing single core processor or multinuclear Device.Processor is alternatively referred to as one or more microprocessors, CPU (CPU) etc..More specifically, processor can be Complicated instruction set calculates (CISC) microprocessor, Jing Ke Cao Neng (RISC) microprocessor, very long instruction word (VLIW) Microprocessor, the processor for realizing other instruction set, or realize the processor of instruction set combination.Processor can also be one or many Individual application specific processor, such as special IC (ASIC), field programmable gate array (FPGA), digital signal processor (DSP), network processing unit, graphic process unit, network processing unit, communication processor, cipher processor, coprocessor, embedded Processor or be capable of process instruction any other type logical block.Processor is used to perform the behaviour discussed by the present invention Make the instruction with step.
Client, mobile terminal or the network equipment in the present invention includes memorizer, for storing big data, it may include one It is individual or multiple volatile storage devices, such as random access memory (RAM), dynamic ram (DRAM), synchronous dram (SDRAM), quiet State RAM (SRAM) or other kinds of storage device.Memorizer can be stored including being performed by processor or any other equipment The information of job sequence.For example, several operation systems, device driver, firmware (for example, input and output fundamental system or ) and/or the executable code and/or data of application program can be loaded in memory and by computing device BIOS.
The operating system of client, mobile terminal or the network equipment in the present invention can be any kind of operating system, Windows, Windows Phone of such as Microsoft, Apple IOS, the Android of Google, and Linux, Unix operating systems or other real-time or embedded OS VxWorks etc..
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing Accompanying drawing to be used needed for having technology description is briefly described, it should be apparent that, below explanation and accompanying drawing are for the present invention Be it is exemplary, and be understood not to limit the present invention.Following description describe numerous details to facilitate to this Sensible solution.However, in some instances, well known or conventional details is not simultaneously specified, the requirement succinct to meet description.This The equipment and control method of invention is referring to following embodiments:
First embodiment
If Fig. 1 is shown in smart mobile phone module diagram of the present invention, Fig. 2 first embodiment of the invention structural representations:
A kind of smart mobile phone 100, including navigation positioning module 110 and communication module 120, also includes and the smart mobile phone The antitheft mobile phone account of binding, such as described antitheft mobile phone account can be arranged on the network equipment (end) 300;
When the antitheft mobile phone account of distal end sends robbed or burgled instruction to the smart mobile phone 100, the smart mobile phone starts institute State navigation positioning module 110 and communication module 120;
The navigation positioning module 110, for positioning the latitude and longitude information of the smart mobile phone;
The communication module 120, for the latitude and longitude information is sent to the antitheft mobile phone account.
Preferably, described smart mobile phone, the smart mobile phone 100 also include (information) synchronization module 130, (letter Breath) synchronization module 130, it is described anti-for the user data in the smart mobile phone 100 is synchronized to by the communication module Mobile phone account designated storage location is stolen, such as synchronous storage is on the network equipment 300.
Preferably, described smart mobile phone, the smart mobile phone 100 also include lock machine module 140, the lock machine module, For according to the described robbed or burgled instruction for receiving, locking the smart mobile phone 100.Can generate password locking temporarily;Or Only just it is locked out, only sending unlock instruction by antitheft mobile phone account could unlock.
Second embodiment
On the basis of embodiment one, there is provided a kind of robbed or burgled tracing system:As Fig. 3 shows for intelligent watch module of the present invention It is intended to, Fig. 4 is shown in second embodiment of the invention structural representation:
A kind of robbed or burgled tracing system based on smart mobile phone, the system include the smart mobile phone 100 and intelligent watch 200, it is stored in the intelligent watch 200 with the antitheft mobile phone account of the binding of the smart mobile phone 100, when the login intelligence After the antitheft mobile phone account in wrist-watch 200, remotely robbed or burgled instruction is sent to the smart mobile phone 100.Because wrist-watch is worn In wrist, it is not easy to which come off loss, and mobile phone is typically placed only in trousers pocket/pocket or pocket/pocket, and Jing is often drawn out and made With easily loss or stolen.The binding of mobile phone and wrist-watch (by antitheft mobile phone account) is set, it is easier to find mobile phone in time It is robbed or burgled, avoid loss, especially immeasurable information/data/address list loss.
Preferably, described robbed or burgled tracing system, the intelligent watch 200 also include Distance Judgment module 260, it is described away from From judge module, for judging according to the intelligent watch and the smart mobile phone longitude and latitude that each navigation positioning module is provided Information, calculates the distance between the two.
Preferably, described robbed or burgled tracing system, the intelligent watch also include data and image analysis module 250, institute Data and image analysis module are stated, for the latitude and longitude information of smart mobile phone described in real time parsing.And then realize to robbed or burgled mobile phone Real-time tracing.
Preferably, described robbed or burgled tracing system, the intelligent watch also include (long-range) control module 240, described (remote Journey) control module, for remote control by the data syn-chronization in the smart mobile phone to the intelligent watch.It is provided with intelligent watch and deposits Reservoir.
Preferably, described robbed or burgled tracing system, (long-range) control module 240 delete the intelligence for remote control Data in mobile phone.
Preferably, described robbed or burgled tracing system, (long-range) control module 240, for sending robbed or burgled alarm signal. The information of " mobile phone of certain 139XXX is robbed or burgled " is such as sent to 110 robber and police centers, the longitude and latitude of the mobile phone can be further sent Degree information gives 110 robber and police centers.
The present embodiment additionally provides a kind of robbed or burgled method for tracing of smart mobile phone, and such as Fig. 5 is second embodiment of the invention flow process Shown in schematic diagram:The smart mobile phone and intelligent watch are matched, and are comprised the steps:
S100:The latitude and longitude information of the smart mobile phone is interacted with the latitude and longitude information of the intelligent watch;
S200:When the Distance Judgment module 260 of the intelligent watch judges the intelligent watch with the smart mobile phone When distance exceedes presetting threshold value, the Distance Judgment module by the antitheft mobile phone account bound with the smart mobile phone, Remotely robbed or burgled instruction is sent to the smart mobile phone.
Preferably, the robbed or burgled method for tracing of smart mobile phone, S300:(long-range) the control module remote control of the intelligent watch is by institute State in the memorizer 290 of the data syn-chronization to the intelligent watch in smart mobile phone.
It is further preferred that the robbed or burgled method for tracing of smart mobile phone, S250:The time module 270 of the intelligent watch judges The intelligent watch time interval synchronous with the smart mobile phone, when the time module judges that the time interval is less than institute When stating time threshold, then not log-on data synchronic command.
Preferably, the robbed or burgled method for tracing of smart mobile phone, S400:240 remote control of (long-range) control module of the intelligent watch Delete the data in the smart mobile phone.Prevent personal information from leaking, further loss is caused to former owner and is injured.
Preferably, the robbed or burgled method for tracing of smart mobile phone, S500:(long-range) control module 240 of the intelligent watch sends Robbed or burgled alarm signal.The information of " mobile phone of certain 139XXX is robbed or burgled " is such as sent to 110 robber and police centers, can further be sent The latitude and longitude information of the mobile phone gives 110 robber and police centers.
3rd embodiment
A kind of antitheft mobile phone of offer of the present embodiment the systems technology followed the trail of, can be by wrist-watch 200 and mobile phone 100 The strong and weak of bluetooth real-time communication signal is realized reporting to the police, and realizes real time synchronization by synchronizing information module, by built-in GPS Module accurately obtains the geographical position of stolen mobile phone.
Current mobile phone does not possess antitheft and tracking function substantially, and generally mobile phone once leave human body certain limit very It is possible to lose or stolen.Current only Mobile phone burglar alarm, needs are external, and not only antitheft insensitive, positioning is inaccurate, letter Breath synchronously can not retain, and affect attractive in appearance.
The present invention realizes antitheft, the tracking of mobile phone based on intelligent watch, by bluetooth real-time communication signal monitoring, by report Alarm device 280 realizes Realtime Alerts, while realizing that real time synchronization and GPS module are obtained in real time by synchronizing information module The geographical position of stolen mobile phone, and wrist-watch end is sent to, and then quickly recover stolen mobile phone.
The modular structure of the present embodiment is the method for the present invention shown in third embodiment of the invention module diagram such as Fig. 6 It is described as follows:
A, bluetooth communication real time signal processing;
B, anti-theft tracking are opened in real time;
C, recalls information synchronization module realize information real-time synchronization and self-destruction;
D, calls built-in GPS module gain-of-function mobile phone current location;
Mobile phone current location information is pushed to intelligent watch by E;
F, synchronization process.
For current phone anti-theft tracking technology the drawbacks of, be to realize preferably protection mobile phone and personal information, this It is bright to disclose a kind of anti-theft tracking of mobile phone technology based on intelligent watch, divulged a secret with preferably preventing and treating personal information.If Fig. 7 is this Shown in bright 3rd embodiment schematic flow sheet, including following device and key step:First, by intelligent watch and mobile phone Built-in blue-tooth device and bluetooth communication agreement, distance therebetween is parsed by mutually parsing bluetooth signal intensity, And following real-time operation is carried out by seeing if fall out set communication distance threshold value:
Judge by Distance Judgment module 260, beyond communication distance threshold value, wrist-watch end sends alarm signal in real time, notify User;
Beyond communication distance threshold value, the synchronizing information and self-destruction module of intelligent watch and mobile phone terminal are waken up in real time, if one Determine synchronizing information is then carried out in scope, and while judged according to lock in time last time, by time module 270, if distance Last lock in time then judges without synchronization less than time threshold, judges quickly to carry out relevant information if beyond time threshold Real-time data synchronization;Go beyond the scope, enter row information self-destruction protection.Can either so ensure can not Copy Info reservation, and Personal account information etc. can be protected;
Beyond communication distance threshold value, after intelligent watch sends alarm signal, waking up can only wrist-watch and mobile phone two ends GPS module, the GPS module for calling two ends built-in obtain the geographical position of current phone, and the positional information is sent to intelligence Wrist-watch end, intelligent watch section passes through data and image analysis obtain the geographical position of mobile phone in real time, and then realizes the reality to mobile phone When follow the trail of.
The present invention is simple to operate, safe and reliable, and real time synchronization is strong;Combine with remote control function, prevent mobile phone Loss, preserve it is important can not Copy Info personal information leakage.
1) threshold value is arranged by bluetooth communication signal intensity, in wrist-watch end real-time monitoring;
2) by information real-time synchronization module, alarm signal send and meanwhile carry out it is important and can not Copy Info guarantor Stay, the self-destruction of account information, to preserve and protect personal information;
3) obtain the positional information of other side by GPS module mobile phone and intelligent watch in real time, intelligent watch end can be by Data and image analysis carry out real-time tracing to mobile phone.
The present embodiment is reported to the police and GPS real-time positioning double shields using Bluetooth signal detection, by wrist-watch and the indigo plant of mobile phone The strong and weak of tooth real-time communication signal is realized reporting to the police, and realizes real time synchronization and self-destruction by synchronizing information module, by built-in GPS module accurately obtain the geographical position of stolen mobile phone, preferably real-time protection hand-set from stolen or can recover, and while Userspersonal information is preserved and protected.
It is obvious to a person skilled in the art that the invention is not restricted to the details of above-mentioned one exemplary embodiment, Er Qie In the case of spirit or essential attributes without departing substantially from the present invention, the present invention can be realized in other specific forms.Therefore, no matter From the point of view of which point, embodiment all should be regarded as exemplary, and be nonrestrictive, the scope of the present invention is by appended power Profit is required rather than described above is limited, it is intended that all in the implication and scope of the equivalency of claim by falling Change is included in the present invention.Any reference in claim should not be considered as and limit involved claim.This Outward, it is clear that " including ", a word was not excluded for other units or step, and odd number is not excluded for plural number.That what is stated in device claim is multiple Unit or device can also be realized by software or hardware by a unit or device.The first, the second grade word is used for table Show title, and be not offered as any specific order.

Claims (12)

1. a kind of smart mobile phone, including navigation positioning module and communication module, it is characterised in that also include and the smart mobile phone The antitheft mobile phone account of binding,
When antitheft mobile phone account sends robbed or burgled instruction to the smart mobile phone, the smart mobile phone starts the navigation positioning module And communication module;
The navigation positioning module, for positioning the latitude and longitude information of the smart mobile phone;
The communication module, for the latitude and longitude information is sent to the antitheft mobile phone account.
2. smart mobile phone according to claim 1, it is characterised in that the smart mobile phone also includes synchronizing information module, Described information synchronization module, it is described antitheft for the user data in the smart mobile phone is synchronized to by the communication module Mobile phone account designated storage location.
3. smart mobile phone according to claim 2, it is characterised in that the smart mobile phone also includes lock machine module, described Lock machine module, for according to the described robbed or burgled instruction for receiving, locking the smart mobile phone.
4. a kind of robbed or burgled tracing system based on smart mobile phone as claimed in claim 1, the system also include intelligent watch, Characterized in that, be stored in the intelligent watch with the antitheft mobile phone account of smart mobile phone binding, when the login intelligence After the antitheft mobile phone account in energy wrist-watch, robbed or burgled instruction is sent to the smart mobile phone.
5. robbed or burgled tracing system according to claim 4, it is characterised in that the intelligent watch also includes Distance Judgment mould Block, the Distance Judgment module, for judging the distance of the intelligent watch and the smart mobile phone.
6. robbed or burgled tracing system according to claim 5, it is characterised in that the intelligent watch also includes data and image Parsing module, the data and image analysis module, for the latitude and longitude information of smart mobile phone described in real time parsing.
7. robbed or burgled tracing system according to claim 4, it is characterised in that the intelligent watch also includes control module, The control module, for remote control by the data syn-chronization in the smart mobile phone to the intelligent watch.
8. robbed or burgled tracing system according to claim 7, it is characterised in that the control module, deletes institute for remote control State the data in smart mobile phone.
9. the robbed or burgled method for tracing of a kind of smart mobile phone, the smart mobile phone and intelligent watch are matched, it is characterised in that included Following steps:
The latitude and longitude information of the smart mobile phone is interacted with the latitude and longitude information of the intelligent watch;
Preset when the Distance Judgment module of the intelligent watch judges that the intelligent watch is exceeded with the distance of the smart mobile phone During fixed threshold value, the Distance Judgment module by the antitheft mobile phone account bound with the smart mobile phone, to the intelligent handss Machine sends robbed or burgled instruction.
10. according to the robbed or burgled method for tracing of claim 9 smart mobile phone, it is characterised in that the control module of the intelligent watch is distant Control is by the data syn-chronization in the smart mobile phone to the intelligent watch.
11. according to the robbed or burgled method for tracing of claim 10 smart mobile phone, it is characterised in that the time module of the intelligent watch is sentenced The disconnected intelligent watch time interval synchronous with the smart mobile phone, when the time module judges that the time interval is less than During the time threshold, then not log-on data synchronic command.
12. according to the robbed or burgled method for tracing of claim 9 smart mobile phone, it is characterised in that the control module of the intelligent watch is distant The data in the smart mobile phone are deleted in control.
CN201610954394.3A 2016-10-27 2016-10-27 Intelligent mobile phone, theft tracking system and theft tracking method Pending CN106534516A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610954394.3A CN106534516A (en) 2016-10-27 2016-10-27 Intelligent mobile phone, theft tracking system and theft tracking method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610954394.3A CN106534516A (en) 2016-10-27 2016-10-27 Intelligent mobile phone, theft tracking system and theft tracking method

Publications (1)

Publication Number Publication Date
CN106534516A true CN106534516A (en) 2017-03-22

Family

ID=58325496

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610954394.3A Pending CN106534516A (en) 2016-10-27 2016-10-27 Intelligent mobile phone, theft tracking system and theft tracking method

Country Status (1)

Country Link
CN (1) CN106534516A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107017909A (en) * 2017-05-26 2017-08-04 苏州科盈思电子科技有限公司 wireless finger ring
CN107222832A (en) * 2017-05-17 2017-09-29 杭州魔猫科技有限公司 A kind of geo-fencing system of charger baby
CN109409144A (en) * 2018-09-03 2019-03-01 平安科技(深圳)有限公司 Terminal alarms method, apparatus, computer equipment and storage medium
CN114363452A (en) * 2021-12-31 2022-04-15 湖南工学院 Smart phone anti-theft and tracking method based on somatosensory interaction

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002186022A (en) * 2000-12-08 2002-06-28 Nippon Denki Information Technology Kk Wearable terminal system
CN1992746A (en) * 2005-12-28 2007-07-04 集嘉通讯股份有限公司 Data backup and reduction method
CN102663868A (en) * 2012-04-18 2012-09-12 李曙胜 Security protection realizing method and system of mobile intelligent terminal
CN105430178A (en) * 2015-11-05 2016-03-23 上海斐讯数据通信技术有限公司 Wristband, mobile terminal and security information processing method and system thereof, and communication system
CN105993162A (en) * 2015-09-23 2016-10-05 深圳还是威健康科技有限公司 Method of preventing losing terminal and smart band

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002186022A (en) * 2000-12-08 2002-06-28 Nippon Denki Information Technology Kk Wearable terminal system
CN1992746A (en) * 2005-12-28 2007-07-04 集嘉通讯股份有限公司 Data backup and reduction method
CN102663868A (en) * 2012-04-18 2012-09-12 李曙胜 Security protection realizing method and system of mobile intelligent terminal
CN105993162A (en) * 2015-09-23 2016-10-05 深圳还是威健康科技有限公司 Method of preventing losing terminal and smart band
CN105430178A (en) * 2015-11-05 2016-03-23 上海斐讯数据通信技术有限公司 Wristband, mobile terminal and security information processing method and system thereof, and communication system

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107222832A (en) * 2017-05-17 2017-09-29 杭州魔猫科技有限公司 A kind of geo-fencing system of charger baby
CN107222832B (en) * 2017-05-17 2018-05-08 杭州魔猫科技有限公司 A kind of geo-fencing system of charger baby
CN107017909A (en) * 2017-05-26 2017-08-04 苏州科盈思电子科技有限公司 wireless finger ring
CN109409144A (en) * 2018-09-03 2019-03-01 平安科技(深圳)有限公司 Terminal alarms method, apparatus, computer equipment and storage medium
CN114363452A (en) * 2021-12-31 2022-04-15 湖南工学院 Smart phone anti-theft and tracking method based on somatosensory interaction

Similar Documents

Publication Publication Date Title
US6362736B1 (en) Method and apparatus for automatic recovery of a stolen object
US8902066B2 (en) Alert for real-time risk of theft or loss
EP2115953B1 (en) Apparatus and methods for locating, tracking and/or recovering a wireless communication device
CN106534516A (en) Intelligent mobile phone, theft tracking system and theft tracking method
US20080108370A1 (en) System and Method for Tracking, Monitoring, Collecting, Reporting and Communicating with the Movement of Individuals
CN106558206A (en) A kind of portable anti-lost method based on active RFID technology
US20090251318A1 (en) Anti-theft system of mobile device
US9609119B2 (en) Disablement of lost or stolen device
CA2607236C (en) System and method for tracking, monitoring, communicating and responding to the movement of individuals and assets
CN202617350U (en) Mobile phone safety management and control system
CN105929429A (en) Tracker for preventing loss of objects
WO2019052020A1 (en) Alarm method, mobile terminal, and computer storage medium
GB2518940A (en) Mobile-device security
CN105282700A (en) Tracking method, tracking server, and tracking system
CN201314171Y (en) Anti-theft code case
CN100502599C (en) Security management method for mobile phone
TWI711319B (en) Block chain-based smart alarm method and device, and electronic equipment
EP2780900B1 (en) Systems and methods for recovering low power devices
KR20230012086A (en) Safety check service method using smart device
US20150223019A1 (en) System and method for tracking assets
CN103945325A (en) Mobile phone anti-theft and tracking system based on J2EE and Android platform
CN109451024B (en) Power grid resource data updating mobile operation terminal protection method based on Beidou system
US20150310716A1 (en) System and method for preventing loss of asset
CN113114741A (en) Secret communication system in electronic payment network system
CN110086942B (en) Anti-theft method, device and equipment of intelligent terminal and storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20170322

WD01 Invention patent application deemed withdrawn after publication