CN100466861C - Anti-theft method for cell phone - Google Patents
Anti-theft method for cell phone Download PDFInfo
- Publication number
- CN100466861C CN100466861C CNB2006100632257A CN200610063225A CN100466861C CN 100466861 C CN100466861 C CN 100466861C CN B2006100632257 A CNB2006100632257 A CN B2006100632257A CN 200610063225 A CN200610063225 A CN 200610063225A CN 100466861 C CN100466861 C CN 100466861C
- Authority
- CN
- China
- Prior art keywords
- mobile phone
- antitheft
- steps
- information
- handset
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 45
- 230000006870 function Effects 0.000 claims description 19
- 238000004891 communication Methods 0.000 claims description 11
- 230000006835 compression Effects 0.000 claims description 5
- 238000007906 compression Methods 0.000 claims description 5
- 230000006378 damage Effects 0.000 description 4
- 230000006855 networking Effects 0.000 description 3
- 230000000694 effects Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 238000011084 recovery Methods 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 206010063900 Steal syndrome Diseases 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000004321 preservation Methods 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/10—Architectures or entities
- H04L65/102—Gateways
- H04L65/1043—Gateway controllers, e.g. media gateway control protocol [MGCP] controllers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F1/00—Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
- G06F1/16—Constructional details or arrangements
- G06F1/1613—Constructional details or arrangements for portable computers
- G06F1/1626—Constructional details or arrangements for portable computers with a single-body enclosure integrating a flat display, e.g. Personal Digital Assistants [PDAs]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F1/00—Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
- G06F1/16—Constructional details or arrangements
- G06F1/1613—Constructional details or arrangements for portable computers
- G06F1/1633—Constructional details or arrangements of portable computers not specific to the type of enclosures covered by groups G06F1/1615 - G06F1/1626
- G06F1/1637—Details related to the display arrangement, including those related to the mounting of the display in the housing
- G06F1/1639—Details related to the display arrangement, including those related to the mounting of the display in the housing the display being based on projection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/305—Authentication, i.e. establishing the identity or authorisation of security principals by remotely controlling device operation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/74—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/88—Detecting or preventing theft or loss
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/10—Digital recording or reproducing
- G11B20/10009—Improvement or modification of read or write signals
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/10—Digital recording or reproducing
- G11B20/10009—Improvement or modification of read or write signals
- G11B20/10305—Improvement or modification of read or write signals signal quality assessment
- G11B20/10398—Improvement or modification of read or write signals signal quality assessment jitter, timing deviations or phase and frequency errors
- G11B20/10425—Improvement or modification of read or write signals signal quality assessment jitter, timing deviations or phase and frequency errors by counting out-of-lock events of a PLL
-
- H—ELECTRICITY
- H03—ELECTRONIC CIRCUITRY
- H03L—AUTOMATIC CONTROL, STARTING, SYNCHRONISATION OR STABILISATION OF GENERATORS OF ELECTRONIC OSCILLATIONS OR PULSES
- H03L7/00—Automatic control of frequency or phase; Synchronisation
- H03L7/06—Automatic control of frequency or phase; Synchronisation using a reference signal applied to a frequency- or phase-locked loop
- H03L7/08—Details of the phase-locked loop
- H03L7/085—Details of the phase-locked loop concerning mainly the frequency- or phase-detection arrangement including the filtering or amplification of its output signal
- H03L7/091—Details of the phase-locked loop concerning mainly the frequency- or phase-detection arrangement including the filtering or amplification of its output signal the phase or frequency detector using a sampling device
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B10/00—Transmission systems employing electromagnetic waves other than radio-waves, e.g. infrared, visible or ultraviolet light, or employing corpuscular radiation, e.g. quantum communication
- H04B10/25—Arrangements specific to fibre transmission
- H04B10/2575—Radio-over-fibre, e.g. radio frequency signal modulated onto an optical carrier
- H04B10/25752—Optical arrangements for wireless networks
- H04B10/25753—Distribution optical network, e.g. between a base station and a plurality of remote units
- H04B10/25754—Star network topology
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/24—Radio transmission systems, i.e. using radiation field for communication between two or more posts
- H04B7/26—Radio transmission systems, i.e. using radiation field for communication between two or more posts at least one of which is mobile
- H04B7/2628—Radio transmission systems, i.e. using radiation field for communication between two or more posts at least one of which is mobile using code-division multiple access [CDMA] or spread spectrum multiple access [SSMA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04J—MULTIPLEX COMMUNICATION
- H04J13/00—Code division multiplex systems
- H04J13/0077—Multicode, e.g. multiple codes assigned to one user
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04J—MULTIPLEX COMMUNICATION
- H04J13/00—Code division multiplex systems
- H04J13/16—Code allocation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/004—Arrangements for detecting or preventing errors in the information received by using forward error control
- H04L1/0056—Systems characterized by the type of code used
- H04L1/0064—Concatenated codes
- H04L1/0066—Parallel concatenated codes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/004—Arrangements for detecting or preventing errors in the information received by using forward error control
- H04L1/0056—Systems characterized by the type of code used
- H04L1/0067—Rate matching
- H04L1/0068—Rate matching by puncturing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/12—Arrangements for detecting or preventing errors in the information received by using return channel
- H04L1/16—Arrangements for detecting or preventing errors in the information received by using return channel in which the return channel carries supervisory signals, e.g. repetition request signals
- H04L1/1607—Details of the supervisory signal
- H04L1/1685—Details of the supervisory signal the supervisory signal being transmitted in response to a specific request, e.g. to a polling signal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/12—Arrangements for detecting or preventing errors in the information received by using return channel
- H04L1/16—Arrangements for detecting or preventing errors in the information received by using return channel in which the return channel carries supervisory signals, e.g. repetition request signals
- H04L1/18—Automatic repetition systems, e.g. Van Duuren systems
- H04L1/1829—Arrangements specially adapted for the receiver end
- H04L1/1835—Buffer management
- H04L1/1841—Resequencing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/46—Interconnection of networks
- H04L12/4641—Virtual LANs, VLANs, e.g. virtual private networks [VPN]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L25/00—Baseband systems
- H04L25/02—Details ; arrangements for supplying electrical power along data transmission lines
- H04L25/03—Shaping networks in transmitter or receiver, e.g. adaptive shaping networks
- H04L25/03006—Arrangements for removing intersymbol interference
- H04L25/03012—Arrangements for removing intersymbol interference operating in the time domain
- H04L25/03019—Arrangements for removing intersymbol interference operating in the time domain adaptive, i.e. capable of adjustment during data reception
- H04L25/03038—Arrangements for removing intersymbol interference operating in the time domain adaptive, i.e. capable of adjustment during data reception with a non-recursive structure
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L25/00—Baseband systems
- H04L25/38—Synchronous or start-stop systems, e.g. for Baudot code
- H04L25/40—Transmitting circuits; Receiving circuits
- H04L25/49—Transmitting circuits; Receiving circuits using code conversion at the transmitter; using predistortion; using insertion of idle bits for obtaining a desired frequency spectrum; using three or more amplitude levels ; Baseband coding techniques specific to data transmission systems
- H04L25/4902—Pulse width modulation; Pulse position modulation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L25/00—Baseband systems
- H04L25/38—Synchronous or start-stop systems, e.g. for Baudot code
- H04L25/40—Transmitting circuits; Receiving circuits
- H04L25/49—Transmitting circuits; Receiving circuits using code conversion at the transmitter; using predistortion; using insertion of idle bits for obtaining a desired frequency spectrum; using three or more amplitude levels ; Baseband coding techniques specific to data transmission systems
- H04L25/4904—Transmitting circuits; Receiving circuits using code conversion at the transmitter; using predistortion; using insertion of idle bits for obtaining a desired frequency spectrum; using three or more amplitude levels ; Baseband coding techniques specific to data transmission systems using self-synchronising codes, e.g. split-phase codes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L25/00—Baseband systems
- H04L25/38—Synchronous or start-stop systems, e.g. for Baudot code
- H04L25/40—Transmitting circuits; Receiving circuits
- H04L25/49—Transmitting circuits; Receiving circuits using code conversion at the transmitter; using predistortion; using insertion of idle bits for obtaining a desired frequency spectrum; using three or more amplitude levels ; Baseband coding techniques specific to data transmission systems
- H04L25/497—Transmitting circuits; Receiving circuits using code conversion at the transmitter; using predistortion; using insertion of idle bits for obtaining a desired frequency spectrum; using three or more amplitude levels ; Baseband coding techniques specific to data transmission systems by correlative coding, e.g. partial response coding or echo modulation coding transmitters and receivers for partial response systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L27/00—Modulated-carrier systems
- H04L27/10—Frequency-modulated carrier systems, i.e. using frequency-shift keying
- H04L27/14—Demodulator circuits; Receiver circuits
- H04L27/156—Demodulator circuits; Receiver circuits with demodulation using temporal properties of the received signal, e.g. detecting pulse width
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/06—Management of faults, events, alarms or notifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/10—Flow control; Congestion control
- H04L47/15—Flow control; Congestion control in relation to multipoint traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/70—Admission control; Resource allocation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/70—Admission control; Resource allocation
- H04L47/72—Admission control; Resource allocation using reservation actions during connection setup
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/70—Admission control; Resource allocation
- H04L47/74—Admission control; Resource allocation measures in reaction to resource unavailability
- H04L47/745—Reaction in network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/70—Admission control; Resource allocation
- H04L47/76—Admission control; Resource allocation using dynamic resource allocation, e.g. in-call renegotiation requested by the user or requested by the network in response to changing network conditions
- H04L47/765—Admission control; Resource allocation using dynamic resource allocation, e.g. in-call renegotiation requested by the user or requested by the network in response to changing network conditions triggered by the end-points
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/70—Admission control; Resource allocation
- H04L47/82—Miscellaneous aspects
- H04L47/822—Collecting or measuring resource availability data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/70—Admission control; Resource allocation
- H04L47/82—Miscellaneous aspects
- H04L47/824—Applicable to portable or mobile terminals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/48—Message addressing, e.g. address format or anonymous messages, aliases
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/58—Message adaptation for wireless communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/09—Mapping addresses
- H04L61/25—Mapping addresses of the same type
- H04L61/2503—Translation of Internet protocol [IP] addresses
- H04L61/255—Maintenance or indexing of mapping tables
- H04L61/2553—Binding renewal aspects, e.g. using keep-alive messages
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/1066—Session management
- H04L65/1101—Session protocols
- H04L65/1104—Session initiation protocol [SIP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/40—Support for services or applications
- H04L65/4061—Push-to services, e.g. push-to-talk or push-to-video
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/085—Secret sharing or secret splitting, e.g. threshold schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/304—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy based on error correction codes, e.g. McEliece
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
- H04M1/72409—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
- H04M1/72415—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories for remote control of appliances
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M7/00—Arrangements for interconnection between switching centres
- H04M7/12—Arrangements for interconnection between switching centres for working between exchanges having different types of switching equipment, e.g. power-driven and step by step or decimal and non-decimal
- H04M7/1205—Arrangements for interconnection between switching centres for working between exchanges having different types of switching equipment, e.g. power-driven and step by step or decimal and non-decimal where the types of switching equipement comprises PSTN/ISDN equipment and switching equipment of networks other than PSTN/ISDN, e.g. Internet Protocol networks
- H04M7/1295—Details of dual tone multiple frequency signalling
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/00912—Arrangements for controlling a still picture apparatus or components thereof not otherwise provided for
- H04N1/00957—Compiling jobs, e.g. for batch processing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32106—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title separate from the image data, e.g. in a different computer file
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/40—Picture signal circuits
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N19/00—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
- H04N19/10—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding
- H04N19/102—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding characterised by the element, parameter or selection affected or controlled by the adaptive coding
- H04N19/103—Selection of coding mode or of prediction mode
- H04N19/109—Selection of coding mode or of prediction mode among a plurality of temporal predictive coding modes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N19/00—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
- H04N19/10—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding
- H04N19/134—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding characterised by the element, parameter or criterion affecting or controlling the adaptive coding
- H04N19/136—Incoming video signal characteristics or properties
- H04N19/137—Motion inside a coding unit, e.g. average field, frame or block difference
- H04N19/139—Analysis of motion vectors, e.g. their magnitude, direction, variance or reliability
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N19/00—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
- H04N19/50—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using predictive coding
- H04N19/503—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using predictive coding involving temporal prediction
- H04N19/51—Motion estimation or motion compensation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N19/00—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
- H04N19/50—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using predictive coding
- H04N19/503—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using predictive coding involving temporal prediction
- H04N19/51—Motion estimation or motion compensation
- H04N19/513—Processing of motion vectors
- H04N19/517—Processing of motion vectors by encoding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N19/00—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
- H04N19/50—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using predictive coding
- H04N19/503—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using predictive coding involving temporal prediction
- H04N19/51—Motion estimation or motion compensation
- H04N19/527—Global motion vector estimation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N19/00—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
- H04N19/60—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using transform coding
- H04N19/625—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using transform coding using discrete cosine transform [DCT]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N19/00—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
- H04N19/70—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals characterised by syntax aspects related to video coding, e.g. related to compression standards
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N19/00—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
- H04N19/90—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using coding techniques not provided for in groups H04N19/10-H04N19/85, e.g. fractals
- H04N19/91—Entropy coding, e.g. variable length coding [VLC] or arithmetic coding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/25—Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
- H04N21/254—Management at additional data server, e.g. shopping server, rights management server
- H04N21/2543—Billing, e.g. for subscription services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/41—Structure of client; Structure of client peripherals
- H04N21/418—External card to be used in combination with the client device, e.g. for conditional access
- H04N21/4181—External card to be used in combination with the client device, e.g. for conditional access for conditional access
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/41—Structure of client; Structure of client peripherals
- H04N21/426—Internal components of the client ; Characteristics thereof
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/433—Content storage operation, e.g. storage operation in response to a pause request, caching operations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/45—Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
- H04N21/462—Content or additional data management, e.g. creating a master electronic program guide from data received from the Internet and a Head-end, controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
- H04N21/4623—Processing of entitlement messages, e.g. ECM [Entitlement Control Message] or EMM [Entitlement Management Message]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/47—End-user applications
- H04N21/472—End-user interface for requesting content, additional data or services; End-user interface for interacting with content, e.g. for content reservation or setting reminders, for requesting event notification, for manipulating displayed content
- H04N21/47211—End-user interface for requesting content, additional data or services; End-user interface for interacting with content, e.g. for content reservation or setting reminders, for requesting event notification, for manipulating displayed content for requesting pay-per-view content
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/60—Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client
- H04N21/61—Network physical structure; Signal processing
- H04N21/6156—Network physical structure; Signal processing specially adapted to the upstream path of the transmission network
- H04N21/6175—Network physical structure; Signal processing specially adapted to the upstream path of the transmission network involving transmission via Internet
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/60—Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client
- H04N21/61—Network physical structure; Signal processing
- H04N21/6156—Network physical structure; Signal processing specially adapted to the upstream path of the transmission network
- H04N21/6187—Network physical structure; Signal processing specially adapted to the upstream path of the transmission network involving transmission via a telephone network, e.g. POTS
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/60—Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client
- H04N21/65—Transmission of management data between client and server
- H04N21/658—Transmission by the client directed to the server
- H04N21/6582—Data stored in the client, e.g. viewing habits, hardware capabilities, credit card number
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N23/00—Cameras or camera modules comprising electronic image sensors; Control thereof
- H04N23/57—Mechanical or electrical details of cameras or camera modules specially adapted for being embedded in other devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N5/00—Details of television systems
- H04N5/44—Receiver circuitry for the reception of television signals according to analogue transmission standards
- H04N5/4448—Receiver circuitry for the reception of television signals according to analogue transmission standards for frame-grabbing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N5/00—Details of television systems
- H04N5/44—Receiver circuitry for the reception of television signals according to analogue transmission standards
- H04N5/46—Receiver circuitry for the reception of television signals according to analogue transmission standards for receiving on more than one standard at will
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N5/00—Details of television systems
- H04N5/64—Constructional details of receivers, e.g. cabinets or dust covers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N5/00—Details of television systems
- H04N5/76—Television signal recording
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/01—Conversion of standards, e.g. involving analogue television standards or digital television standards processed at pixel level
- H04N7/0112—Conversion of standards, e.g. involving analogue television standards or digital television standards processed at pixel level one of the standards corresponding to a cinematograph film standard
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/16—Analogue secrecy systems; Analogue subscription systems
- H04N7/162—Authorising the user terminal, e.g. by paying; Registering the use of a subscription channel, e.g. billing
- H04N7/163—Authorising the user terminal, e.g. by paying; Registering the use of a subscription channel, e.g. billing by receiver means only
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/16—Analogue secrecy systems; Analogue subscription systems
- H04N7/173—Analogue secrecy systems; Analogue subscription systems with two-way working, e.g. subscriber sending a programme selection signal
- H04N7/17309—Transmission or handling of upstream communications
- H04N7/17327—Transmission or handling of upstream communications with deferred transmission or handling of upstream communications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N9/00—Details of colour television systems
- H04N9/12—Picture reproducers
- H04N9/31—Projection devices for colour picture display, e.g. using electronic spatial light modulators [ESLM]
- H04N9/3129—Projection devices for colour picture display, e.g. using electronic spatial light modulators [ESLM] scanning a light beam on the display screen
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N9/00—Details of colour television systems
- H04N9/64—Circuits for processing colour signals
- H04N9/642—Multi-standard receivers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N9/00—Details of colour television systems
- H04N9/79—Processing of colour television signals in connection with recording
- H04N9/7921—Processing of colour television signals in connection with recording for more than one processing mode
- H04N9/7925—Processing of colour television signals in connection with recording for more than one processing mode for more than one standard
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04Q—SELECTING
- H04Q3/00—Selecting arrangements
- H04Q3/0016—Arrangements providing connection between exchanges
- H04Q3/0025—Provisions for signalling
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/10—Integrity
- H04W12/106—Packet or message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W28/00—Network traffic management; Network resource management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W36/00—Hand-off or reselection arrangements
- H04W36/02—Buffering or recovering information during reselection ; Modification of the traffic flow during hand-off
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/12—Messaging; Mailboxes; Announcements
- H04W4/14—Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W52/00—Power management, e.g. TPC [Transmission Power Control], power saving or power classes
- H04W52/04—TPC
- H04W52/30—TPC using constraints in the total amount of available transmission power
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W74/00—Wireless channel access
- H04W74/002—Transmission of channel access control information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
- H04W76/12—Setup of transport tunnels
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/04—Large scale networks; Deep hierarchical networks
- H04W84/08—Trunked mobile radio systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2105—Dual mode as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2115—Third party
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/22—Signal processing not specific to the method of recording or reproducing; Circuits therefor for reducing distortions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/08—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
- H04L43/0823—Errors, e.g. transmission errors
- H04L43/0829—Packet loss
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/04—Real-time or near real-time messaging, e.g. instant messaging [IM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/10—Architectures or entities
- H04L65/1016—IP multimedia subsystem [IMS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/42221—Conversation recording systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/0077—Types of the still picture apparatus
- H04N2201/0094—Multifunctional device, i.e. a device capable of all of reading, reproducing, copying, facsimile transception, file transception
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/3212—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to a job, e.g. communication, capture or filing of an image
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/3212—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to a job, e.g. communication, capture or filing of an image
- H04N2201/3222—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to a job, e.g. communication, capture or filing of an image of processing required or performed, e.g. forwarding, urgent or confidential handling
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/3274—Storage or retrieval of prestored additional information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N5/00—Details of television systems
- H04N5/38—Transmitter circuitry for the transmission of television signals according to analogue transmission standards
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N5/00—Details of television systems
- H04N5/44—Receiver circuitry for the reception of television signals according to analogue transmission standards
- H04N5/445—Receiver circuitry for the reception of television signals according to analogue transmission standards for displaying additional information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N5/00—Details of television systems
- H04N5/44—Receiver circuitry for the reception of television signals according to analogue transmission standards
- H04N5/445—Receiver circuitry for the reception of television signals according to analogue transmission standards for displaying additional information
- H04N5/45—Picture in picture, e.g. displaying simultaneously another television channel in a region of the screen
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N5/00—Details of television systems
- H04N5/66—Transforming electric information into light information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N5/00—Details of television systems
- H04N5/76—Television signal recording
- H04N5/765—Interface circuits between an apparatus for recording and another apparatus
- H04N5/775—Interface circuits between an apparatus for recording and another apparatus between a recording apparatus and a television receiver
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N5/00—Details of television systems
- H04N5/76—Television signal recording
- H04N5/84—Television signal recording using optical recording
- H04N5/85—Television signal recording using optical recording on discs or drums
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N5/00—Details of television systems
- H04N5/76—Television signal recording
- H04N5/907—Television signal recording using static stores, e.g. storage tubes or semiconductor memories
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/01—Conversion of standards, e.g. involving analogue television standards or digital television standards processed at pixel level
- H04N7/0117—Conversion of standards, e.g. involving analogue television standards or digital television standards processed at pixel level involving conversion of the spatial resolution of the incoming video signal
- H04N7/0122—Conversion of standards, e.g. involving analogue television standards or digital television standards processed at pixel level involving conversion of the spatial resolution of the incoming video signal the input and the output signals having different aspect ratios
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N9/00—Details of colour television systems
- H04N9/79—Processing of colour television signals in connection with recording
- H04N9/80—Transformation of the television signal for recording, e.g. modulation, frequency changing; Inverse transformation for playback
- H04N9/804—Transformation of the television signal for recording, e.g. modulation, frequency changing; Inverse transformation for playback involving pulse code modulation of the colour picture signal components
- H04N9/8042—Transformation of the television signal for recording, e.g. modulation, frequency changing; Inverse transformation for playback involving pulse code modulation of the colour picture signal components involving data reduction
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W28/00—Network traffic management; Network resource management
- H04W28/16—Central resource management; Negotiation of resources or communication parameters, e.g. negotiating bandwidth or QoS [Quality of Service]
- H04W28/18—Negotiating wireless communication parameters
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W28/00—Network traffic management; Network resource management
- H04W28/16—Central resource management; Negotiation of resources or communication parameters, e.g. negotiating bandwidth or QoS [Quality of Service]
- H04W28/26—Resource reservation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/06—Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]; Services to user groups; One-way selective calling services
- H04W4/10—Push-to-Talk [PTT] or Push-On-Call services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/12—Messaging; Mailboxes; Announcements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W40/00—Communication routing or communication path finding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/20—Control channels or signalling for resource management
- H04W72/23—Control channels or signalling for resource management in the downlink direction of a wireless link, i.e. towards a terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/30—Connection release
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/40—Connection management for selective distribution or broadcast
- H04W76/45—Connection management for selective distribution or broadcast for Push-to-Talk [PTT] or Push-to-Talk over cellular [PoC] services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/22—Processing or transfer of terminal data, e.g. status or physical capabilities
- H04W8/24—Transfer of terminal data
- H04W8/245—Transfer of terminal data from a network towards a terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/26—Network addressing or numbering for mobility support
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/08—Access point devices
- H04W88/085—Access point devices with remote components
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/16—Gateway arrangements
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10S—TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10S370/00—Multiplex communications
- Y10S370/901—Wide area network
- Y10S370/902—Packet switching
- Y10S370/903—Osi compliant network
- Y10S370/906—Fiber data distribution interface, FDDI
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10S—TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10S370/00—Multiplex communications
- Y10S370/901—Wide area network
- Y10S370/902—Packet switching
- Y10S370/903—Osi compliant network
- Y10S370/907—Synchronous optical network, SONET
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Multimedia (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Human Computer Interaction (AREA)
- Software Systems (AREA)
- Databases & Information Systems (AREA)
- Spectroscopy & Molecular Physics (AREA)
- Computing Systems (AREA)
- Electromagnetism (AREA)
- Mathematical Physics (AREA)
- Power Engineering (AREA)
- Optics & Photonics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Discrete Mathematics (AREA)
- Business, Economics & Management (AREA)
- General Business, Economics & Management (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephone Function (AREA)
Abstract
This invention discloses a method for anti-stealing of cell phones including the following steps: A, presetting an anti-stealing function for cell phones including alarm number and information, B, after the cell phone is turned on, the anti-stealing function is started up to test if the user is legal, if not, then the alarm information is sent to said alarm number automatically, C, remotely backing up user information stored in the stolen cell phone, which can still guarantee the safety of user information after the cell phone is lost.
Description
Technical field
The present invention relates to the communications field, relate in particular to a kind of method of antitheft mobile phone.
Background technology
The mobile phone steal phenomenon has become serious social concern at present.Hand-set from stolen not only causes the damage to property of mobile phone itself, and may be caused the loss of telephone charges by free call on somebody else's expense through illegal means; Because mobile phone EMS memory contains user profile, the offender utilizes these information to carry out criminal activity possibly simultaneously.Antitheft mobile phone adopts the mode of password more at present, as antitheft by startup password, promptly preestablishes startup password by the cellphone subscriber, and mobile phone input startup password earlier can be started shooting.Certainly some theft preventing methods that also have other at present, as in mobile phone, setting in advance the information that is used to report to the police, mobile phone carries out legitimacy to the active user and detects behind the login mobile network, judge whether it is a validated user, if then enter normal operating conditions, otherwise mobile phone just sends warning message in default number.
For example: open day is on November 9th, 2005, and notification number is the method for the disclosed a kind of antitheft mobile phone of Chinese patent literature of CN1694548, and this method adopts mobile phone to dial antitheft phone automatically after losing or sends note to the prior antitheft phone of setting of user; Mobile phone receives and the control command that the user uses antitheft phone to send is carried out in decoding, realizes the locking to mobile phone.But it can't carry out the protection of user profile on the mobile phone except reporting to the police, the user profile on the original mobile phone of the owner of lost property also still can be continued to steal by the disabled user.
Summary of the invention
Technical problem to be solved by this invention is to provide a kind of method that can also guarantee the antitheft mobile phone of safety of user information after mobile phone is lost.
For solving the problems of the technologies described above, the technical solution adopted in the present invention is: a kind of method of antitheft mobile phone is provided, and it may further comprise the steps:
A, set in advance the anti-theft feature of mobile phone, comprise warning number and warning message are set;
After B, the start, enabling the anti-theft feature of mobile phone, whether legal, if illegal, then automatically described warning message is sent to described warning number if detecting the user;
The user of C, warning number sends the information of calling anti-theft program to stolen mobile phone;
D, stolen mobile phone judge that this information is to call the information of anti-theft program after receiving the described information of calling anti-theft program, and are sent by the warning number, then begin to call anti-theft program;
E, anti-theft program are sent to antitheft server to user profile;
F, according to identity information download user information to another default mobile phone, the user profile of backup stolen mobile phone.
Described steps A comprises also authentication information is set that described step B further may further comprise the steps:
After B1, the start, anti-theft feature is opened;
Whether B2, the authentication information that detects the user be correct, if correct, then starts the normal communication function, if incorrect, and execution in step B3 then; Or read the information of mobile phone card automatically by mobile phone, and judge whether the mobile phone card is legal, if legal, then start the normal communication function, if illegal, execution in step B3 then;
B3, described warning message is sent to described warning number automatically.
Described steps A further may further comprise the steps:
A11, open the security settings function;
A21, antitheft relevant parameter is set, comprises warning number and warning message are set;
A31, antitheft relevant parameter is saved in the independent memory block.
Also comprised steps A 10 before described steps A 11, generate the key that is used for the encrypted antitheft relevant parameter, described steps A 31 is that the key that antitheft relevant parameter is generated by steps A 10 is come antitheft relevant parameter is carried out encrypting storing in independent memory block; In described step B, after start, the anti-theft feature of enabling mobile phone also comprises step B210 before: judge whether handset is legal.
Described steps A 10 further may further comprise the steps:
A101, initialization;
A102, the data behind the MD5 identifying code are made MD5 output and assignment;
A103, obtain handset number;
A104, handset number is done MD5 output;
A105, get preceding 64 keys of making the ground floor des encryption of MD5 sign indicating number of handset number;
A106, get 64 keys of making second layer des encryption behind the MD5 sign indicating number of handset number;
A107, ground floor and second layer ciphered data are write in the independent memory block.
Described step B210 further may further comprise the steps:
B211, from independent memory block read data, if failure, then shutdown finishes, if success, then execution in step B212;
B212, obtain handset number;
B213, handset number is done MD5 output;
B214, get back 64 of MD5 sign indicating number and do second layer deciphering;
B215, get preceding 64 of MD5 sign indicating number and do ground floor deciphering;
B216, judge that structure length is whether consistent, if inconsistent, then shutdown finishes, if consistent, and execution in step B217 then;
B217, the data behind the MD5 identifying code are done MD5 output;
B218, comparison MD5 output code and MD5 identifying code, if different, then if execution in step B3 identical, then return checking and passes through, and starts the normal communication function.
The described identity information of step F is a handset number, and described step e further may further comprise the steps:
The dialing of C211, anti-theft program and be connected to antitheft server after, the interface that obtains handset number that calls that bottom provides number sends to antitheft server to handset then;
After C212, antitheft server receive handset number, judge whether to exist file,, then create file with handset number name if do not exist with handset number name, execution in step C213 then, if exist, direct execution in step C213 then;
C213, antitheft server are given the stolen mobile phone back information, and stolen mobile phone receives after the back information of antitheft server that anti-theft program is the user profile compression that will upload;
After C214, compression were finished, anti-theft program sent to antitheft server to user profile, and antitheft server is stored in user profile in the file with handset number name.
The invention has the beneficial effects as follows: automatically described warning message is sent to described warning number when incorrect because the method for antitheft mobile phone of the present invention detects user's authentication information, and remote backup is stored in the user profile in the stolen mobile phone, therefore can also guarantee safety of user information after mobile phone is lost; In addition, owing to the present invention is saved in antitheft relevant parameter in the independent memory block, so after preventing hand-set from stolen, the robber destroys antitheft relevant parameter with the method for upgrading, brush machine; Because antitheft relevant parameter of the present invention comes antitheft relevant parameter is carried out encrypting storing in independent memory block by the two-layer encrypted secret key of utilizing handset number generation, therefore can prevent to revise antitheft relevant parameter with illegal means.
Description of drawings
Fig. 1 is the flow chart of the method for antitheft mobile phone of the present invention.
Fig. 2 is the flow chart of steps A of the method for first embodiment of the invention antitheft mobile phone.
Fig. 3 is the flow chart of step B of the method for first embodiment of the invention antitheft mobile phone.
Fig. 4 is the flow chart of step C of the method for first embodiment of the invention antitheft mobile phone.
Fig. 5 is the flow chart of steps A of the method for second embodiment of the invention antitheft mobile phone.
Fig. 6 is the flow chart of steps A 10 of the method for second embodiment of the invention antitheft mobile phone.
Fig. 7 is the steps A 21 of the method for second embodiment of the invention antitheft mobile phone when authentication information is set, the flow chart of the step B of the method for second embodiment of the invention antitheft mobile phone.
Fig. 8 is the steps A 21 of the method for second embodiment of the invention antitheft mobile phone when authentication information not being set, the flow chart of the step B of the method for second embodiment of the invention antitheft mobile phone.
Fig. 9 is the flow chart of step B210 of the method for second embodiment of the invention antitheft mobile phone.
Figure 10 is the flow chart of step C of the method for second embodiment of the invention antitheft mobile phone.
Figure 11 is the flow chart of step C11 of the method for second embodiment of the invention antitheft mobile phone.
Figure 12 is the flow chart of step C21 of the method for second embodiment of the invention antitheft mobile phone.
Figure 13 is the flow chart of step C41 of the method for second embodiment of the invention antitheft mobile phone.
Embodiment
See also Fig. 1, the method for antitheft mobile phone of the present invention may further comprise the steps:
A, set in advance the anti-theft feature of mobile phone, comprise warning number and warning message etc. are set;
After B, the start, enabling the anti-theft feature of mobile phone, whether legal, if illegal, then automatically described warning message is sent to described warning number if detecting the user;
C, remote backup are stored in the user profile in the stolen mobile phone, comprise following situation: described step C is that user's Long-distance Control of described warning number or user profile that stolen mobile phone will be stored in the stolen mobile phone automatically backup on the network, or in another default mobile phone.
See also Fig. 2, the steps A of the method for first embodiment of the invention antitheft mobile phone further may further comprise the steps:
A1, open the security settings function;
A2, antitheft relevant parameter is set, comprises authentication information, warning number and warning message etc. are set;
A3, preservation are provided with.
See also Fig. 3, the step B of the method for first embodiment of the invention antitheft mobile phone further may further comprise the steps:
After B1, the start, anti-theft feature is opened, and this moment, mobile phone was hidden the security settings function automatically, can certainly not hide the security settings function;
Whether B2, the authentication information that detects the user be correct, if correct, then starts the normal communication function, if incorrect, and execution in step B3 then; Or read the information of mobile phone card automatically by mobile phone, and judge whether the mobile phone card is legal, if legal, then start the normal communication function, if illegal, execution in step B3 then;
B3, described warning message is sent to described warning number automatically; This warning message can not receive that note has sent information simultaneously in the middle demonstration of sending short messages of mobile phone.
See also Fig. 4, when step C is user's Long-distance Control of described warning number when being stored in the passback of the user profile in the stolen mobile phone, the step C of the method for first embodiment of the invention antitheft mobile phone further may further comprise the steps:
After the user of C1, warning number receives described warning message, carry the control note or the networking command bag of authentication information to the mobile phone transmission;
After C2, mobile phone received described note or networking command bag, whether mobile phone detects described authentication information correct, if correct, then according to the command-execution operation of controlling note or networking command bag; Described operation comprises the passback of the user profile in the mobile phone and destruction etc., reaching the effect of the user profile protection in the mobile phone, or destroys all user profile in the mobile phone, thereby allows the mobile phone forfeiture function of use of can't starting shooting.
See also Fig. 5, the steps A of the method for second embodiment of the invention antitheft mobile phone further may further comprise the steps:
A11, open the security settings function;
A21, antitheft relevant parameter is set, comprises authentication information, warning number and warning message etc. are set, authentication information also can be set;
A31, antitheft relevant parameter is saved in the independent memory block, thereby has avoided mobile phone to lose at the antitheft relevant parameter in back of formatting diskette, anti-theft feature is ineffective.Described independent memory block can be EEPROM (Electrically-Erasable Programmable Read-Only Memory, Electrically Erasable Read Only Memory), the read-only memory block of independence that separates in EPROM (Erasable Programmable Read-Only Memory, EPROM (Erasable Programmable Read Only Memory)) or the embedded in mobile phone memory.
See also Fig. 6, also comprise steps A 10 before the steps A 11 of the method for second embodiment of the invention antitheft mobile phone, generate the key that is used for the encrypted antitheft relevant parameter, it further may further comprise the steps:
A101, initialization;
A102, the data behind the MD5 identifying code are made MD5 output and assignment;
A103, obtain handset number (the CDMA handset number is called for short ESN number, and the GSM mobile handset fuselage number is called for short IMEI number);
A104, handset number is done MD5 output;
A105, get preceding 64 keys of making the ground floor des encryption of MD5 sign indicating number of handset number;
A106, get 64 keys of making second layer des encryption behind the MD5 sign indicating number of handset number;
A107, described two-layer ciphered data is write in the independent memory block.
Steps A 31 is that the two-layer encrypted secret key that antitheft relevant parameter is generated by steps A 10 is come antitheft relevant parameter is carried out encrypting storing in independent memory block.
See also Fig. 7, if steps A 21 is provided with authentication information, then the step B of the method for second embodiment of the invention antitheft mobile phone further may further comprise the steps:
After B11, the start, detect whether enable anti-theft feature, if not, then enter the normal boot-strap flow process, if then authentication information, execution in step B12 are then imported in prompting;
Whether B12, check authentication information be correct, if correct, then enters anti-theft modes, can normally use mobile phone, also can receive the instruction note and carry out, if mistake then enters stolen pattern;
B13, described warning message is sent to described warning number automatically, and do not discovered by the robber, stolen pattern can be used for having only dial, can receive instruction note and execution, the robber can not discover yet, and other application all can not be used, user instruction comprises the destruction hand-set data, the locking card, locking mobile phone, shutdown, calling transfer, uplink data is transmitted new message, and new message etc. is transmitted in cancellation.
See also Fig. 8, if steps A 21 is not provided with authentication information, then the step B of the method for second embodiment of the invention antitheft mobile phone further may further comprise the steps:
After B21, the start, anti-theft feature is opened, and this moment, mobile phone was hidden the security settings function automatically, can certainly not hide the security settings function;
B22, mobile phone read the information of mobile phone card automatically, judge whether the mobile phone card is legal, if legal, then start the normal communication function, if illegal, and execution in step B23 then;
B23, described warning message is sent to described warning number automatically, and do not discovered by the robber, stolen pattern can be used for having only dial, can receive user instruction note and execution, the robber can not discover yet, and other application all can not be used, user instruction comprises the destruction hand-set data, the locking card, locking mobile phone, shutdown, calling transfer, uplink data is transmitted new message, and new message etc. is transmitted in cancellation.
See also Fig. 9, the step B of the method for second embodiment of the invention antitheft mobile phone, after start, the anti-theft feature of enabling mobile phone also comprises step B210 before, judge whether handset is legal, the handset number of promptly judging handset whether with independent memory block in the handset of storing number identical, it further may further comprise the steps:
B211, from independent memory block read data, if failure, then shutdown finishes, if success, then execution in step B212;
B212, obtain handset number;
B213, handset number is done MD5 output;
B214, get back 64 of MD5 sign indicating number and do second layer deciphering;
B215, get preceding 64 of MD5 sign indicating number and do ground floor deciphering;
B216, judge that structure length is whether consistent, if inconsistent, then shutdown finishes, if consistent, and execution in step B217 then;
B217, the data behind the MD5 identifying code are done MD5 output;
B218, comparison MD5 output code and MD5 identifying code, if different, then if execution in step B3 identical, then return checking and passes through, and starts the normal communication function.
See also Figure 10, when step C is user's Long-distance Control of described warning number when being stored in the passback of the user profile in the stolen mobile phone, the passback that the described Long-distance Control of the step C of the method for second embodiment of the invention antitheft mobile phone is stored in the user profile in the stolen mobile phone further may further comprise the steps:
C11, startup anti-theft program; See also Figure 11, it further may further comprise the steps:
The user of C111, warning number sends the information of calling anti-theft program to mobile phone;
After C112, mobile phone receive described information, judge that this information is to call the information of anti-theft program, and send, then begin to call anti-theft program by the warning number
C21, anti-theft program are sent to antitheft server to user profile, see also Figure 12, and it further may further comprise the steps:
The dialing of C211, anti-theft program and be connected to antitheft server after, the interface that obtains handset number that calls that bottom provides number sends to antitheft server to handset then;
After C212, antitheft server receive handset number, judge whether to exist file,, then create file with handset number name if do not exist with handset number name, execution in step C213 then, if exist, direct execution in step C213 then;
C213, antitheft server are given the mobile phone back information, mobile phone is received after the back information of antitheft server, anti-theft program is compressed into the zip bag to the user profile (contact person and schedule) that will upload, before compressed file, judge whether mobile phone has the SD card earlier, if have and capacity greater than 2M, then on the SD card, compress, if capacity less than 2M, then compresses in the UserDate district; If there is not the SD card, then directly compress in the UserDate district;
After C214, compression were finished, anti-theft program sent to antitheft server to user profile with the form of zip bag, and antitheft server is stored in user profile in the file with handset number name.
C31, according to identity information (as handset number) download user information to mobile phone, the user profile of backup mobile phone:
Backup data package is handled by the contact staff in the backstage, and at first the client provides handset number, and the contact staff logins background management system, number searches whether this client's backed up data bag is arranged on the server by handset.If have, then with its download, change as next step processing then, if do not have, inform that then client's backup data package does not exist, and can't fetch the data in the lost mobile phone.
The user profile of backup mobile phone is divided into two kinds of situations: first kind of situation is the mobile phone that the user has bought mobile-phone manufacturers again; Second kind of situation is the user profile that the user only wants can watch by webpage oneself.
First kind of situation only need be user profile (the zip bag of contact person and schedule) by the back-stage management program, promptly to being uploaded to the program that data in server is handled, download on the memory of new mobile phone, for example on the SD card, call the backup of SD card and recovery routine then then to recover the user profile before own.
See also Figure 13, second kind of situation may further comprise the steps:
C411, user profile is downloaded on the memory of mobile phone by the back-stage management program, for example on the SD card;
C412, backup and recovery routine by the SD card return to user profile on the mobile phone;
C413, by wireless stand-by program, user profile is backuped on the server of wireless backup.
Authentication information of the present invention can be anti-theft cipher, fingerprint key etc.The present invention also can be behind hand-set from stolen the user bring in the control remote backup by the control of internet logging in network and be stored in user profile in the stolen mobile phone by sending Email or user.
The above is preferred embodiment of the present invention only, is not to be used to limit protection scope of the present invention, all any modifications of being made within the spirit and principles in the present invention, is equal to replacement, improvement etc., all should be included within protection scope of the present invention.
Claims (8)
1, a kind of method of antitheft mobile phone is characterized in that may further comprise the steps:
A, set in advance the anti-theft feature of mobile phone, comprise warning number and warning message are set;
After B, the start, enabling the anti-theft feature of mobile phone, whether legal, if illegal, then automatically described warning message is sent to described warning number if detecting the user;
The user of C, warning number sends the information of calling anti-theft program to stolen mobile phone;
D, stolen mobile phone judge that this information is to call the information of anti-theft program after receiving the described information of calling anti-theft program, and are sent by the warning number, then begin to call anti-theft program;
E, anti-theft program are sent to antitheft server to user profile;
F, according to identity information download user information to another default mobile phone, the user profile of backup stolen mobile phone.
2. the method for claim 1 is characterized in that: described steps A comprises also authentication information is set that described step B further may further comprise the steps:
After B1, the start, anti-theft feature is opened;
Whether B2, the authentication information that detects the user be correct, if correct, then starts the normal communication function, if incorrect, and execution in step B3 then; Or read the information of mobile phone card automatically by mobile phone, and judge whether the mobile phone card is legal, if legal, then start the normal communication function, if illegal, execution in step B3 then;
B3, described warning message is sent to described warning number automatically.
3. the method for claim 1, it is characterized in that: described steps A further may further comprise the steps:
A11, open the security settings function;
A21, antitheft relevant parameter is set, comprises warning number and warning message are set;
A31, antitheft relevant parameter is saved in the independent memory block.
4. method as claimed in claim 3 is characterized in that: described independent memory block is the read-only memory block of independence that separates in Electrically Erasable Read Only Memory EEPROM, EPROM (Erasable Programmable Read Only Memory) EPROM or the embedded in mobile phone memory.
5. method as claimed in claim 3, it is characterized in that: before described steps A 11, also comprise steps A 10, generation is used for the key of encrypted antitheft relevant parameter, and described steps A 31 is that the key that antitheft relevant parameter is generated by steps A 10 is come antitheft relevant parameter is carried out encrypting storing in independent memory block; In described step B, after start, the anti-theft feature of enabling mobile phone also comprises step B210 before: judge whether handset is legal.
6. method as claimed in claim 5 is characterized in that: described steps A 10 further may further comprise the steps:
A101, initialization;
A102, the data behind the MD5 identifying code are made MD5 output and assignment;
A103, obtain handset number;
A104, handset number is done MD5 output;
A105, get preceding 64 keys of making the ground floor des encryption of MD5 sign indicating number of handset number;
A106, get 64 keys of making second layer des encryption behind the MD5 sign indicating number of handset number;
A107, ground floor and second layer ciphered data are write in the independent memory block.
7. method as claimed in claim 6 is characterized in that: described step B210 further may further comprise the steps:
B211, from independent memory block read data, if failure, then shutdown finishes, if success, then execution in step B212;
B212, obtain handset number;
B213, handset number is done MD5 output;
B214, get back 64 of MD5 sign indicating number and do second layer deciphering;
B215, get preceding 64 of MD5 sign indicating number and do ground floor deciphering;
B216, judge that structure length is whether consistent, if inconsistent, then shutdown finishes, if consistent, and execution in step B217 then;
B217, the data behind the MD5 identifying code are done MD5 output;
B218, comparison MD5 output code and MD5 identifying code, if different, then if execution in step B3 identical, then return checking and passes through, and starts the normal communication function.
8. the method for claim 1 is characterized in that: the described identity information of step F is a handset number, and described step e further may further comprise the steps:
The dialing of C211, anti-theft program and be connected to antitheft server after, the interface that obtains handset number that calls that bottom provides number sends to antitheft server to handset then;
After C212, antitheft server receive handset number, judge whether to exist file,, then create file with handset number name if do not exist with handset number name, execution in step C213 then, if exist, direct execution in step C213 then;
C213, antitheft server are given the stolen mobile phone back information, and stolen mobile phone receives after the back information of antitheft server that anti-theft program is the user profile compression that will upload;
After C214, compression were finished, anti-theft program sent to antitheft server to user profile, and antitheft server is stored in user profile in the file with handset number name.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2006100632257A CN100466861C (en) | 2006-10-19 | 2006-10-19 | Anti-theft method for cell phone |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2006100632257A CN100466861C (en) | 2006-10-19 | 2006-10-19 | Anti-theft method for cell phone |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1946230A CN1946230A (en) | 2007-04-11 |
CN100466861C true CN100466861C (en) | 2009-03-04 |
Family
ID=38045390
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB2006100632257A Active CN100466861C (en) | 2006-10-19 | 2006-10-19 | Anti-theft method for cell phone |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN100466861C (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10687216B2 (en) | 2016-09-13 | 2020-06-16 | Huawei Technologies Co., Ltd. | Antitheft method for mobile terminal and apparatus |
Families Citing this family (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101437203A (en) * | 2007-11-13 | 2009-05-20 | 鸿富锦精密工业(深圳)有限公司 | Mobile communication equipment and message transmission method thereof |
CN101252703B (en) * | 2008-03-28 | 2012-05-30 | 宇龙计算机通信科技(深圳)有限公司 | Terminal data protecting method, system as well as mobile communication terminal |
CN101291502B (en) * | 2008-06-16 | 2012-01-25 | 内蒙古电子信息职业技术学院 | Anti-theft method for mobile phone |
CN101859467B (en) * | 2009-04-11 | 2013-06-05 | 深圳富泰宏精密工业有限公司 | Electronic device |
CN101640722A (en) * | 2009-05-19 | 2010-02-03 | 上海闻泰电子科技有限公司 | Mobile phone with safety protection function and safety protection method thereof |
CN102413456B (en) * | 2011-09-02 | 2014-11-19 | 中国电信股份有限公司 | User terminal anti-theft method, user terminal anti-theft device and user terminal anti-theft system based on operation network |
CN103220637A (en) * | 2012-01-19 | 2013-07-24 | 腾讯科技(深圳)有限公司 | Mobile phone anti-theft protection method and mobile phone anti-theft protection device |
CN102663868A (en) * | 2012-04-18 | 2012-09-12 | 李曙胜 | Security protection realizing method and system of mobile intelligent terminal |
CN102932540B (en) * | 2012-10-24 | 2014-05-14 | 广东欧珀移动通信有限公司 | Mobile terminal and stealing prevention method thereof |
CN103457991B (en) * | 2013-05-29 | 2017-03-15 | 北京奇虎科技有限公司 | A kind of terminal safety protection method and system |
CN103634477B (en) * | 2013-12-11 | 2016-01-20 | 深圳市亚略特生物识别科技有限公司 | There is theft preventing method and the system of the mobile phone of fingerprint device |
CN105554227B (en) * | 2014-10-31 | 2020-02-21 | 东莞宇龙通信科技有限公司 | Method and device for improving terminal information security and terminal |
CN104317668A (en) * | 2014-11-18 | 2015-01-28 | 深圳市汇顶科技股份有限公司 | Malicious operation identifying method and device for mobile terminal |
CN105992125B (en) * | 2015-02-16 | 2020-01-10 | 阿里巴巴集团控股有限公司 | Method and device for protecting safety of electronic equipment |
CN105740677B (en) * | 2016-02-29 | 2018-09-14 | 宇龙计算机通信科技(深圳)有限公司 | A kind of method for start-up and shutdown, system and intelligent mobile terminal |
CN106488443A (en) * | 2016-06-30 | 2017-03-08 | 深圳市美贝壳科技有限公司 | A kind of method protecting data in mobile phone with home intelligent equipment |
CN106778374A (en) * | 2016-11-30 | 2017-05-31 | 上海与德信息技术有限公司 | Terminal and its method for preventing fraudulent-using |
CN106851562A (en) * | 2017-01-03 | 2017-06-13 | 惠州Tcl移动通信有限公司 | It is a kind of prevent mobile phone lose after leakage of content method and system |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH08182052A (en) * | 1994-12-26 | 1996-07-12 | Casio Comput Co Ltd | Radio communication system, radio communication portable information terminal equipment and radio base station |
JP2004032402A (en) * | 2002-06-26 | 2004-01-29 | Sharp Corp | Data backup system for portable telephone |
US6741851B1 (en) * | 1999-10-30 | 2004-05-25 | Samsung Electronics Co., Ltd. | Method for protecting data stored in lost mobile terminal and recording medium therefor |
CN1555183A (en) * | 2003-12-23 | 2004-12-15 | 联想(北京)有限公司 | Hand held terminal anti-theft report device and method |
CN1599396A (en) * | 2003-09-16 | 2005-03-23 | 张岩 | Method and software for preventing mobile phone burglar |
CN1602096A (en) * | 2003-09-25 | 2005-03-30 | 中兴通讯股份有限公司 | Method of backup of personal information lost in mobile terminal |
CN1694548A (en) * | 2004-05-11 | 2005-11-09 | 天时达中科电子(深圳)有限公司 | Method for preventing burglarious of mobile phone and anti-theft mobile phone |
-
2006
- 2006-10-19 CN CNB2006100632257A patent/CN100466861C/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH08182052A (en) * | 1994-12-26 | 1996-07-12 | Casio Comput Co Ltd | Radio communication system, radio communication portable information terminal equipment and radio base station |
US6741851B1 (en) * | 1999-10-30 | 2004-05-25 | Samsung Electronics Co., Ltd. | Method for protecting data stored in lost mobile terminal and recording medium therefor |
JP2004032402A (en) * | 2002-06-26 | 2004-01-29 | Sharp Corp | Data backup system for portable telephone |
CN1599396A (en) * | 2003-09-16 | 2005-03-23 | 张岩 | Method and software for preventing mobile phone burglar |
CN1602096A (en) * | 2003-09-25 | 2005-03-30 | 中兴通讯股份有限公司 | Method of backup of personal information lost in mobile terminal |
CN1555183A (en) * | 2003-12-23 | 2004-12-15 | 联想(北京)有限公司 | Hand held terminal anti-theft report device and method |
CN1694548A (en) * | 2004-05-11 | 2005-11-09 | 天时达中科电子(深圳)有限公司 | Method for preventing burglarious of mobile phone and anti-theft mobile phone |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10687216B2 (en) | 2016-09-13 | 2020-06-16 | Huawei Technologies Co., Ltd. | Antitheft method for mobile terminal and apparatus |
Also Published As
Publication number | Publication date |
---|---|
CN1946230A (en) | 2007-04-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN100466861C (en) | Anti-theft method for cell phone | |
JP5893169B2 (en) | Anti-theft protection method and device for mobile phone | |
CN101252703B (en) | Terminal data protecting method, system as well as mobile communication terminal | |
US5655004A (en) | Method and apparatus for detection of cellular phone fraud | |
CN102739868B (en) | The loss processing method of mobile terminal and system | |
AU760714B2 (en) | Method and system for verifying the authenticity of a first communication participants in a communications network | |
CN102930188A (en) | Screen unlocking method and device as well as terminal | |
CN101616495A (en) | The method and system of individual privacy in the protection mobile phone | |
CN100473194C (en) | Handset anti-theft method | |
EP2849468B1 (en) | Server and method for remotely controlling working of communication terminal, and communication terminal | |
US20140220971A1 (en) | Change of Subscription Data In An Identification Module | |
EP1901577B1 (en) | Apparatus and method for controlling bluetooth in portable terminal | |
CN102387498A (en) | Anti-theft system and method for mobile telephone | |
CN101155212A (en) | Method for limiting use of mobile terminal | |
CN101163290A (en) | Method of limiting use of mobile terminal through machine-card mutual authentication | |
CN103905649B (en) | A kind of mobile phone antitheft system based on Bluetooth technology | |
JP2021535630A (en) | Methods, devices, programs, and storage media for controlling door guards | |
CN109842877A (en) | A method of realizing that IMSI changes function in SIM card | |
CN109561413A (en) | A kind of the bluetooth authentication authorization method and authoring system of BLE equipment | |
CN103079009A (en) | Anti-theft method for mobile phone and anti-theft mobile phone | |
CN102387494A (en) | Android-mobile-platform-based remote automatic information exchange and control solution | |
CN101656966A (en) | Data protection method of mobile terminal, device thereof and mobile terminal | |
CN101877848A (en) | Mobile terminal, mobile terminal data protection method and mobile terminal monitoring system | |
CN101895829A (en) | Method and system for retrieving FLASH data from mobile telephone, and mobile telephone | |
CN100571436C (en) | A kind of implementation method of mobile terminal information resource safety guarantee |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20190109 Address after: 518057 Desai Science and Technology Building, 9789 Shennan Avenue, Yuehai Street, Nanshan District, Shenzhen City, Guangdong Province, 17th Floor (15th Floor of Natural Floor) 1702-1703 Patentee after: Shenzhen acoustic Cmi Holdings Ltd Address before: 518000 8th Floor, Block B, Innovation Science and Technology Plaza, Tian'an Digital City, Chegongmiao, Shenzhen City, Guangdong Province Patentee before: Yulong Computer and Communication Sci. & Tech. (Shenzhen) Co., Ltd. |
|
TR01 | Transfer of patent right |