CN102316407A - Mobile phone and mobile phone stolen tracking method - Google Patents

Mobile phone and mobile phone stolen tracking method Download PDF

Info

Publication number
CN102316407A
CN102316407A CN2010102201914A CN201010220191A CN102316407A CN 102316407 A CN102316407 A CN 102316407A CN 2010102201914 A CN2010102201914 A CN 2010102201914A CN 201010220191 A CN201010220191 A CN 201010220191A CN 102316407 A CN102316407 A CN 102316407A
Authority
CN
China
Prior art keywords
mobile phone
sim
module
note
current
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2010102201914A
Other languages
Chinese (zh)
Other versions
CN102316407B (en
Inventor
李敬来
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Simcom Ltd
Original Assignee
Shanghai Simcom Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Simcom Ltd filed Critical Shanghai Simcom Ltd
Priority to CN201010220191.4A priority Critical patent/CN102316407B/en
Publication of CN102316407A publication Critical patent/CN102316407A/en
Application granted granted Critical
Publication of CN102316407B publication Critical patent/CN102316407B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Telephone Function (AREA)

Abstract

The invention discloses a mobile phone, which comprises a short message module, a global positioning system (GPS) module and a stolen tracking module, wherein the stolen tracking module comprises a safe storage region, a safe short message judgment module, a safe password judgment module and a subscriber identity module (SIM) card judgment module. The invention also discloses a mobile phone stolen tracking method realized by using the mobile phone. The stolen tracking function can be started after the mobile phone is stolen, the current SIM card number of the mobile phone and the current position of the mobile phone are sent to the warning number preset by legal users in a mode of short messages, and the function is very favorable for police to fight against crime, so the loss of the users is possibly recuperated.

Description

Mobile phone and hand-set from stolen tracking
Technical field
The present invention relates to a kind of mobile phone, particularly relate to a kind of mobile phone and hand-set from stolen tracking.
Background technology
Along with the raising of social economy's level and the development of mechanics of communication, communication products such as mobile phone have been deep in the common people's the daily life very widely.People can use mobile phone to accomplish a lot of important things, for example store Bank Account Number, address list and schedule or the like.Thus; Mobile phone has become an inseparable part in people's life gradually; But problem of the thing followed is that mobile phone is as easy as rolling off a log stolen, and in the market that is perhaps livening up on the crowded bus, on the subway, mobile phone is easy to stolen by the offender unawares.The stolen direct property loss that at first can cause the user of mobile phone; More serious is; The offender also possibly utilize the userspersonal information that stores in the mobile phone even user's kith and kin or client's personal information to be engaged in illegal activity, thereby gives user or its kith and kin further, the client causes more great direct property.Therefore; If can be after hand-set from stolen; Obtain some in time about the position of mobile phone or the current SIM of mobile phone (Subscriber Identity Module; Subscriber identification module) information of card number or the like helps public security department with extremely and fights crime, thereby retrieves user's loss as much as possible.
Summary of the invention
The technical problem that the present invention will solve is in order to overcome in the prior art after user's hand-set from stolen; The user just is difficult to reentry about the defective of the current information of mobile phone, and a kind of mobile phone and a kind of corresponding hand-set from stolen tracking that can after stolen, feed back its current SIM number and current location thereof in time is provided.
The present invention solves above-mentioned technical problem through following technical proposals: a kind of mobile phone; It comprises a SMS module and a GPS (Global Positioning System; Global positioning system) module, its characteristics are that this mobile phone also comprises a stolen tracking module; This stolen tracking module comprises: a secure storage areas is used to store a safe note, a security password and at least one warning number; One safe note judge module; Be used to judge whether the note that this SMS module receives is this safe note; If not; Then call this SMS module and show this note, if then call this SMS module the current location that the current SIM of this mobile phone number and this GPS module obtain is sent to this warning number and does not show this safe note; One security password judge module; Be used for judges and whether imported this security password; If import; Then normally start this mobile phone, if input, then after starting this mobile phone, call this SMS module the current location that the current SIM of this mobile phone number and this GPS module obtain is sent to this warning number; One SIM judge module is used to judge whether the current SIM number of this mobile phone and before this SIM be number identical, if identical, then is failure to actuate, if inequality, then call this security password judge module judges and whether imported this security password.
Preferably; This SIM judge module comprises that also one is set with first timer of a safety time; Be used for judging the current SIM number of this mobile phone and before this SIM number moment inequality, behind this safety time, just call this security password judge module judges and whether imported this security password from this SIM judge module.
Preferably; This stolen tracking module also comprises one second timer; Be used for when this safe note judge module judges that note that this SMS module receives is for this safe note, call this SMS module with a fixed frequency current location that the current SIM of this mobile phone number and this GPS module obtain is sent to this warning number; And; Be used for when this SIM judge module judges that number inequality and this security password judge module judges of the current SIM number of this mobile phone and before this SIM is not imported this security password, call this SMS module with this fixed frequency the current location of the current SIM of this mobile phone number and this GPS module acquisition is sent to this warning number.
Preferably, when this SMS module was called by this safe note judge module or this security password judge module, this SMS module was sent to this warning number with the backstage way of short messages with the current location that the current SIM of this mobile phone number and this GPS module obtain.
Another technical scheme of the present invention is: a kind of hand-set from stolen tracking that utilizes above-mentioned mobile phone to realize, its characteristics are that this method may further comprise the steps: S 1, the user is provided with this safe note, this security password and should the warning number; S 2, this mobile phone judges whether the note that receives is this safe note, if not then show this note, if the current location that then the current SIM of this mobile phone number and this GPS module is obtained is sent to this warning number and does not show this safe note; And; This mobile phone judges whether current SIM number and before this SIM be number identical, if identically then be failure to actuate, if inequality; Then whether judges has imported this security password; If imported and then normally start this mobile phone, if input, the current location that then after starting this mobile phone, the current SIM of this mobile phone number and this GPS module is obtained is sent to this warning number.
Preferably, at step S 2In, judge current SIM number and before this SIM number moment inequality from this mobile phone, whether this mobile phone has just been imported this security password to the user and has been judged behind a safety time.
Preferably, at step S 2In, this mobile phone is sent to this warning number with a fixed frequency with the current location that the current SIM of this mobile phone number and this GPS module obtain.
Preferably, at step S 2In, this mobile phone is sent to this warning number with the backstage way of short messages with the current location that the current SIM of this mobile phone number and this GPS module obtain.
Positive progressive effect of the present invention is: the present invention provides stolen following function for common mobile phone; And adopt dual mode to guarantee that this stolen following function can in time start after hand-set from stolen; That is, if the offender does not change the SIM in the mobile phone, then validated user can utilize safe note to start the stolen following function of this mobile phone; And if the offender has changed the SIM in the mobile phone; Then this mobile phone can be after the replacing action that identifies SIM, utilize security password to start the stolen following function of this mobile phone, and this stolen following function will be sent to the preset warning number of validated user with the current SIM of this mobile phone number and current location thereof with way of short messages; This helps public security department with extremely fights crime, thereby retrieves user's loss as much as possible.
Description of drawings
Fig. 1 is the structured flowchart of this mobile phone of the present invention.
Fig. 2 is the process flowchart of this mobile phone of the present invention to note.
Fig. 3 is the process flowchart of this mobile phone of the present invention to SIM and security password.
Embodiment
Provide preferred embodiment of the present invention below in conjunction with accompanying drawing, to specify technical scheme of the present invention.
As shown in Figure 1, this mobile phone with stolen following function of the present invention at first comprises a common short message module 1 and a common GPS module 2.In addition, this mobile phone also comprises a stolen tracking module 3, and this stolen tracking module 3 comprises: the safe note judge module of a secure storage areas 31, one 32, a security password judge module 33 and a SIM judge module 34.
This secure storage areas 31 is used to store validated user preset a safe note, a security password and at least one warning number, and this warning number can comprise frequent another phone number that uses of this validated user and number 110 of public safety alarm platform or the like.So-called here secure storage areas be meant in this mobile phone internal storage areas can not modifier area; Except the user that holds this security password can be to being stored in data in this secure storage areas make amendment; Other is any can't make amendment to the data in this secure storage areas per capita, even even the program of this mobile phone is carried out burning again also can't realize this modification.
This safe note judge module 32 can be monitored each bar note that this SMS module 1 receives, and judges whether its content is in full accord with the content of this safe note.If the content of the short message content that receives and this safe note is not quite identical; Explain that then this note that receives is merely a normal short message; This safe note judge module 32 will call 1 pair of this note of this SMS module and show normally this moment, read for validated user; And if the content of the short message content that receives and this safe note is in full accord; Explain that then this note that receives just is being this preset safe note of validated user; This safe note judge module 32 will call the current location that this SMS module 1 surveys this mobile phone of acquisitions with the current SIM of this mobile phone number and this GPS module 2 and be sent to this warning number in the lump this moment, especially, and in order to guarantee being kept absolutely secret of this safe short message content; And the stolen following function of also perceiving this mobile phone for the delinquency prevention molecule starts; In this case, this safe note judge module 32 will be controlled this SMS module 1, make it not show this safe note.
This security password judge module 33 will operation under the calling of this SIM judge module 34, and whether it can import this security password to the user is judged.If this security password is imported, explain that then the active user of this mobile phone is validated user, this security password judge module 33 will can not start the stolen following function of this mobile phone this moment, and this mobile phone will normally start; If this security password is not imported; The active user that this mobile phone then is described is the disabled user, and this moment, this security password judge module 33 will start the stolen following function of this mobile phone, promptly; Call the current location that this SMS module 1 surveys this mobile phone that obtains with the current SIM of this mobile phone number and this GPS module and be sent to this warning number in the lump; Especially, the stolen following function of perceiving this mobile phone for the delinquency prevention molecule starts, in this case; Though this disabled user does not import this security password, this mobile phone still will normally start from the teeth outwards.
The SIM that this SIM judge module 34 can use the current SIM of this mobile phone number and this mobile phone before this number compares in real time.If current SIM number and before this SIM are number identical; The active user that this mobile phone then is described is validated user (comprising situation about inserting again after situation and this validated user that this validated user did not take out SIM all the time will same SIM card take out), or this mobile phone is stolen but the offender does not change the interior SIM of this mobile phone.To the not stolen situation of this mobile phone; Because this moment, this SIM judge module 34 can't move; Therefore can not activate the stolen following function that this security password judge module 33 starts this mobile phone naturally; This mobile phone will normally not worked under this validated user takes out the situation of SIM all the time, or normally start under the situation about after this validated user will this same SIM card takes out, inserting again; And to the stolen situation of this mobile phone; Because this SIM judge module 34 can not move equally; Therefore can't activate the stolen following function that this security password judge module 33 starts this mobile phone; But will mention hereinafter, this moment, validated user will be possible to use the stolen following function that this safe note starts this mobile phone.If current SIM number and before this SIM are number inequality; Explain that then validated user changed SIM (also comprise this validated user this mobile phone is lent the situation that friend uses) voluntarily; Or this mobile phone is stolen and the offender has changed the SIM in this mobile phone; At this moment, this SIM judge module 34 will call this security password judge module 33 and move.To the not stolen situation of this mobile phone, because the active user of this mobile phone still be a validated user, so it will know this security password, need only it and after having inserted new SIM, import this security password in time, and then this mobile phone will normally start; And to the stolen situation of this mobile phone, because the offender can not obtain this security password, so this security password judge module 33 will start the stolen following function of this mobile phone.
Preferably; Because for the purpose of safety; When the active user of this mobile phone has changed the SIM in this mobile phone; This mobile phone can't be on operation interface prompting need the input security password, therefore be necessary that reserving the regular hour to validated user imports this security password in time, with the error starting of the stolen following function that prevents this mobile phone.Thus; Can in this SIM judge module 34, design one be set with a safety time first timer 341, when active user that this SIM judge module 34 identifies this mobile phone has changed the SIM in this mobile phone, it will wait for the overtime of this safety time; If before overtime; This current user has imported this security password in time, and then after this security password judge module 33 was called, it just can not start the stolen following function of this mobile phone; And if overtime up to this safety time, this current user does not import this security password, and then after this security password judge module 33 was called, it just can start the stolen following function of this mobile phone.
In addition; This stolen tracking module 3 can also comprise one second timer 35; Can set a fixed frequency in this second timer 35; For example once a day, when this safe note judge module 32 judged that note that these SMS modules 1 receive is for this safe note, this second timer 35 just can be controlled this safe note judge module 32 and call this SMS module 1 according to this fixed frequency the current location that the current SIM of this mobile phone number and this GPS module obtain is sent to this warning number; And; When this SIM judge module 34 judges that number inequality and these security password judge module 33 judges of the current SIM number of these mobile phones and before this SIM are not imported this security password; This second timer 35 just can be controlled this security password judge module 33 and call this SMS module 1 according to this fixed frequency the current location that the current SIM of this mobile phone number and this GPS module obtain is sent to this warning number; Thus under the situation of this hand-set from stolen; The validated user of this mobile phone and public security department just can grasp offender's whereabouts rule, fight crime in time thereby help public security department.
In addition; Under the situation of this hand-set from stolen; In order not discovered when the current location of the current SIM that sends this mobile phone number and this mobile phone by the offender; When this SMS module 1 is called by this safe note judge module 32 or this security password judge module 33, this SMS module 1 will be sent to this warning number with the current location that the current SIM of this mobile phone number and this GPS module obtain with the backstage way of short messages.
Referring to figs. 2 and 3 shown in, this hand-set from stolen tracking of the present invention may further comprise the steps:
S 1, the user is provided with safe note, security password and warning number.
S 2, this mobile phone judges whether the note that receives is this safe note, if not then show this note, if the current location that then the current SIM of this mobile phone number and this GPS module is obtained is sent to this warning number and does not show this safe note; And; This mobile phone judges whether current SIM number and before this SIM be number identical, if identically then be failure to actuate, if inequality; Then whether judges has imported this security password; If imported and then normally start this mobile phone, if input, the current location that then after starting this mobile phone, the current SIM of this mobile phone number and this GPS module is obtained is sent to this warning number.
Below will be elaborated to this stolen tracking of the present invention through a specific embodiment.
At first; The user is when bringing into use this mobile phone for the first time; Just safe note, security password and warning number should be set in time in this mobile phone; These important informations will be stored in the above-mentioned secure storage areas 31, and in order to ensure the confidentiality of this safe note and this security password and prevent that validated user from forgeing, this safe note and this security password must have certain complexity; Certain write rule but must have so that this validated user is remembered; For example, content that can this safe note is set to " * sfsf fs8244fafaffsfsfw sfsfe ", and this security password is set to " 8444lkj ".
Under the normal operating conditions of this mobile phone, this mobile phone is as shown in Figure 2 to the processing procedure of the note that receives:
Step 100, this mobile phone receives the note from another mobile phone.
Step 101, this mobile phone judge whether the content of this note is in full accord with the content of this safe note, if not quite identical, then execution in step 102; If in full accord, then execution in step 103.
Step 102, this mobile phone normally shows this note.
Step 103, this mobile phone does not show this note, and on the backstage current location of the current SIM of this mobile phone number and this mobile phone is sent to this preset warning number in the lump.
This mobile phone is then as shown in Figure 3 to the processing procedure of SIM and security password:
Step 200, this mobile phone judge whether current SIM number and before this SIM be number identical, if identical, then execution in step 201; If inequality, then execution in step 202.
Step 201, this mobile phone is normally worked under the situation that SIM was not removed all the time, or after this same SIM card is removed, is normally started under the situation about inserting again again.
Step 202, this mobile phone judge whether the active user has imported this security password, if import, then execution in step 203; If not input, then execution in step 204.
Step 203, this mobile phone normally starts.
Step 204; Normally start on this mobile phone surface; But in fact can after system start-up, start stolen following function immediately, that is, this mobile phone will be after startup be sent to this preset warning number with the backstage way of short messages with the current location of current SIM number and this mobile phone in the lump.
If this mobile phone is stolen accidentally; Whether changed the SIM in this mobile phone according to the offender; Can start the stolen following function of this mobile phone through dual mode; And wherein, the user can dial the approach of the former SIM number of this mobile phone through for example trying and confirm whether the offender has carried out the replacing of SIM.
If through dialing; Find that the offender does not change the SIM in this mobile phone; Then can utilize this preset safe note to come manually to start the stolen following function of this mobile phone, that is, the user can use another mobile phone to send this preset safe note to this mobile phone; At this moment; It is in full accord that this mobile phone just can be judged the note and this safe note that receive in step 101, thereby in step 103, start the stolen following function of this mobile phone, and wherein the current SIM that sends of backstage number will be the former SIM of this mobile phone number.
If through dialing; Find that the offender has changed the SIM in this mobile phone; The user just need not to carry out any operation; As long as the offender has inserted new SIM in this mobile phone; Or after the offender sells this mobile phone; In this mobile phone, inserted new SIM by the buyer; Then this mobile phone can be judged this disabled user and after inserting new SIM, not import this security password in step 202; Thereby in step 204, start the stolen following function of this mobile phone, wherein the current SIM that sends of backstage number will be the new SIM of this mobile phone number.
Certainly, be noted that in the normal use of this mobile phone; If validated user is changed SIM voluntarily; Or this mobile phone is lent friend use, then must after inserting new SIM, import this security password in time, in case the stolen following function of this mobile phone error starting.
In sum; The present invention can start stolen following function in time after hand-set from stolen; So that the current SIM of this mobile phone number and current location thereof are sent to the preset warning number of validated user with way of short messages; This helps public security department with extremely fights crime, thereby retrieves user's loss as much as possible.
Though more than described embodiment of the present invention, it will be understood by those of skill in the art that these only illustrate, protection scope of the present invention is limited appended claims.Those skilled in the art can make numerous variations or modification to these execution modes under the prerequisite that does not deviate from principle of the present invention and essence, but these changes and modification all fall into protection scope of the present invention.

Claims (8)

1. mobile phone, it comprises a SMS module and a GPS module, it is characterized in that, and this mobile phone also comprises a stolen tracking module, and this stolen tracking module comprises:
One secure storage areas is used to store a safe note, a security password and at least one warning number;
One safe note judge module; Be used to judge whether the note that this SMS module receives is this safe note; If not; Then call this SMS module and show this note; If then call this SMS module the current location that the current SIM of this mobile phone number and this GPS module obtain be sent to this warning number and do not show this safe note;
One security password judge module; Be used for judges and whether imported this security password; If import; Then normally start this mobile phone, if input, then after starting this mobile phone, call this SMS module the current location that the current SIM of this mobile phone number and this GPS module obtain is sent to this warning number;
One SIM judge module is used to judge whether the current SIM number of this mobile phone and before this SIM be number identical, if identical, then is failure to actuate, if inequality, then call this security password judge module judges and whether imported this security password.
2. mobile phone as claimed in claim 1; It is characterized in that; This SIM judge module comprises that also one is set with first timer of a safety time; Be used for judging the current SIM number of this mobile phone and before this SIM number moment inequality, behind this safety time, just call this security password judge module judges and whether imported this security password from this SIM judge module.
3. according to claim 1 or claim 2 mobile phone; It is characterized in that; This stolen tracking module also comprises one second timer; Be used for when this safe note judge module judges that note that this SMS module receives is for this safe note, call this SMS module with a fixed frequency current location that the current SIM of this mobile phone number and this GPS module obtain is sent to this warning number; And; Be used for when this SIM judge module judges that number inequality and this security password judge module judges of the current SIM number of this mobile phone and before this SIM is not imported this security password, call this SMS module with this fixed frequency the current location of the current SIM of this mobile phone number and this GPS module acquisition is sent to this warning number.
4. mobile phone as claimed in claim 1; It is characterized in that; When this SMS module was called by this safe note judge module or this security password judge module, this SMS module was sent to this warning number with the backstage way of short messages with the current location that the current SIM of this mobile phone number and this GPS module obtain.
5. hand-set from stolen tracking that utilizes the described mobile phone of claim 1 to realize is characterized in that this method may further comprise the steps:
S 1, the user is provided with this safe note, this security password and should the warning number;
S 2, this mobile phone judges whether the note that receives is this safe note, if not then show this note, if the current location that then the current SIM of this mobile phone number and this GPS module is obtained is sent to this warning number and does not show this safe note; And; This mobile phone judges whether current SIM number and before this SIM be number identical, if identically then be failure to actuate, if inequality; Then whether judges has imported this security password; If imported and then normally start this mobile phone, if input, the current location that then after starting this mobile phone, the current SIM of this mobile phone number and this GPS module is obtained is sent to this warning number.
6. hand-set from stolen tracking as claimed in claim 5 is characterized in that, at step S 2In, judge current SIM number and before this SIM number moment inequality from this mobile phone, whether this mobile phone has just been imported this security password to the user and has been judged behind a safety time.
7. like claim 5 or 6 described hand-set from stolen trackings, it is characterized in that, at step S 2In, this mobile phone is sent to this warning number with a fixed frequency with the current location that the current SIM of this mobile phone number and this GPS module obtain.
8. hand-set from stolen tracking as claimed in claim 5 is characterized in that, at step S 2In, this mobile phone is sent to this warning number with the backstage way of short messages with the current location that the current SIM of this mobile phone number and this GPS module obtain.
CN201010220191.4A 2010-07-06 2010-07-06 Mobile phone and hand-set from stolen tracking Expired - Fee Related CN102316407B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201010220191.4A CN102316407B (en) 2010-07-06 2010-07-06 Mobile phone and hand-set from stolen tracking

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201010220191.4A CN102316407B (en) 2010-07-06 2010-07-06 Mobile phone and hand-set from stolen tracking

Publications (2)

Publication Number Publication Date
CN102316407A true CN102316407A (en) 2012-01-11
CN102316407B CN102316407B (en) 2016-05-18

Family

ID=45429157

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201010220191.4A Expired - Fee Related CN102316407B (en) 2010-07-06 2010-07-06 Mobile phone and hand-set from stolen tracking

Country Status (1)

Country Link
CN (1) CN102316407B (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103595851A (en) * 2012-08-16 2014-02-19 联芯科技有限公司 Personal-information leakage-proof method for mobile terminal and mobile terminal
CN104486727A (en) * 2014-12-25 2015-04-01 上海闻泰电子科技有限公司 Mobile phone anti-theft method and system based on Android system
CN104853013A (en) * 2015-04-21 2015-08-19 努比亚技术有限公司 Mobile terminal and antitheft method and antitheft device thereof
CN105142120A (en) * 2015-08-10 2015-12-09 闻泰通讯股份有限公司 Mobile phone anti-theft system
CN105516500A (en) * 2015-12-14 2016-04-20 广东小天才科技有限公司 Method and system for selecting equipment mode
CN105827857A (en) * 2016-05-06 2016-08-03 北京珠穆朗玛移动通信有限公司 Method for preventing mobile terminal from loss and mobile terminal
CN105959471A (en) * 2016-04-27 2016-09-21 上海斐讯数据通信技术有限公司 Method and terminal for automatic verification and alarming
CN105979491A (en) * 2016-05-09 2016-09-28 北京邮电大学 SIM card remote control method, intelligent terminal and server
CN106874805A (en) * 2017-01-16 2017-06-20 北京奇虎科技有限公司 A kind of data guard method, device and mobile terminal
CN108490390A (en) * 2018-02-28 2018-09-04 北京理工大学 A kind of mobile magnetic source positioning device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050075092A1 (en) * 2003-10-07 2005-04-07 Samsung Electronics Co., Ltd. Mobile communication terminal for protecting private contents and method for controlling the same
CN101039346A (en) * 2006-03-16 2007-09-19 上海晨兴电子科技有限公司 Handset anti-theft method, equipment and communication terminal having the same
CN101287234A (en) * 2008-05-26 2008-10-15 德信无线通讯科技(北京)有限公司 Anti-theft method and device for mobile communication terminal
CN101291502A (en) * 2008-06-16 2008-10-22 内蒙古电子信息职业技术学院 Anti-theft method for mobile phone
CN101459721A (en) * 2007-12-11 2009-06-17 上海晨兴电子科技有限公司 Method and device for anti-theft tracking of mobile phone

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050075092A1 (en) * 2003-10-07 2005-04-07 Samsung Electronics Co., Ltd. Mobile communication terminal for protecting private contents and method for controlling the same
CN101039346A (en) * 2006-03-16 2007-09-19 上海晨兴电子科技有限公司 Handset anti-theft method, equipment and communication terminal having the same
CN101459721A (en) * 2007-12-11 2009-06-17 上海晨兴电子科技有限公司 Method and device for anti-theft tracking of mobile phone
CN101287234A (en) * 2008-05-26 2008-10-15 德信无线通讯科技(北京)有限公司 Anti-theft method and device for mobile communication terminal
CN101291502A (en) * 2008-06-16 2008-10-22 内蒙古电子信息职业技术学院 Anti-theft method for mobile phone

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103595851A (en) * 2012-08-16 2014-02-19 联芯科技有限公司 Personal-information leakage-proof method for mobile terminal and mobile terminal
CN104486727A (en) * 2014-12-25 2015-04-01 上海闻泰电子科技有限公司 Mobile phone anti-theft method and system based on Android system
CN104853013A (en) * 2015-04-21 2015-08-19 努比亚技术有限公司 Mobile terminal and antitheft method and antitheft device thereof
CN105142120A (en) * 2015-08-10 2015-12-09 闻泰通讯股份有限公司 Mobile phone anti-theft system
CN105516500A (en) * 2015-12-14 2016-04-20 广东小天才科技有限公司 Method and system for selecting equipment mode
CN105516500B (en) * 2015-12-14 2019-02-19 广东小天才科技有限公司 Method and system for selecting equipment mode
CN105959471A (en) * 2016-04-27 2016-09-21 上海斐讯数据通信技术有限公司 Method and terminal for automatic verification and alarming
CN105827857A (en) * 2016-05-06 2016-08-03 北京珠穆朗玛移动通信有限公司 Method for preventing mobile terminal from loss and mobile terminal
CN105827857B (en) * 2016-05-06 2019-06-25 北京珠穆朗玛移动通信有限公司 A kind of method that mobile terminal is anti-lost and mobile terminal
CN105979491A (en) * 2016-05-09 2016-09-28 北京邮电大学 SIM card remote control method, intelligent terminal and server
CN106874805A (en) * 2017-01-16 2017-06-20 北京奇虎科技有限公司 A kind of data guard method, device and mobile terminal
CN108490390A (en) * 2018-02-28 2018-09-04 北京理工大学 A kind of mobile magnetic source positioning device
CN108490390B (en) * 2018-02-28 2022-05-17 北京理工大学 Mobile magnetic source positioning device

Also Published As

Publication number Publication date
CN102316407B (en) 2016-05-18

Similar Documents

Publication Publication Date Title
CN102316407A (en) Mobile phone and mobile phone stolen tracking method
US20220182820A1 (en) Method and apparatus for protecting data in a portable electronic device
US11405781B2 (en) System and method for mobile identity protection for online user authentication
US8902066B2 (en) Alert for real-time risk of theft or loss
CN101287298B (en) Authentication method and system for mobile communication terminal
EP2613580B1 (en) System, method and communication terminal for tracking stolen communication terminal
US20090318118A1 (en) System and method for managing missed calls and unread messages
US20130065608A1 (en) Systems and methods for identifying unauthorized users of an electronic device
CN102739868A (en) Mobile terminal loss processing method and system
CN1882131A (en) Method for protecting stolen handset telephone directory
CN104486727A (en) Mobile phone anti-theft method and system based on Android system
CN202617350U (en) Mobile phone safety management and control system
CN101569150A (en) Method and system for detecting a transfer of an endpoint device
CN101815116A (en) Mobile telephone method and device based on multi-user
CN105992125B (en) Method and device for protecting safety of electronic equipment
CN101459721A (en) Method and device for anti-theft tracking of mobile phone
CN101916233B (en) Computer and data elimination method thereof
EP2040497B1 (en) Tracking mobile communication devices
CN103188230A (en) Mobile terminal and data protection method thereof
CN103973876A (en) Mobile terminal and tracking method for lost mobile terminal
CN107292208B (en) Anti-theft method and device for mobile terminal
JP2017513085A (en) Information processing method, terminal, server, communication method, and system
CN100571436C (en) A kind of implementation method of mobile terminal information resource safety guarantee
CN105141736A (en) Information security protection method and apparatus
US20090111439A1 (en) System and method for monitoring a monitored mobile phone

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20160518

Termination date: 20200706

CF01 Termination of patent right due to non-payment of annual fee