CN102316407B - Mobile phone and hand-set from stolen tracking - Google Patents

Mobile phone and hand-set from stolen tracking Download PDF

Info

Publication number
CN102316407B
CN102316407B CN201010220191.4A CN201010220191A CN102316407B CN 102316407 B CN102316407 B CN 102316407B CN 201010220191 A CN201010220191 A CN 201010220191A CN 102316407 B CN102316407 B CN 102316407B
Authority
CN
China
Prior art keywords
mobile phone
module
sim
note
judge
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201010220191.4A
Other languages
Chinese (zh)
Other versions
CN102316407A (en
Inventor
李敬来
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Simcom Ltd
Original Assignee
Shanghai Simcom Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Simcom Ltd filed Critical Shanghai Simcom Ltd
Priority to CN201010220191.4A priority Critical patent/CN102316407B/en
Publication of CN102316407A publication Critical patent/CN102316407A/en
Application granted granted Critical
Publication of CN102316407B publication Critical patent/CN102316407B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Telephone Function (AREA)

Abstract

The invention discloses a kind of mobile phone, it comprises a SMS module and a GPS module, and this mobile phone also comprises a stolen tracking module, and this stolen tracking module comprises: a secure storage areas; One safe note judge module; One security password judge module; One SIM judge module. The invention also discloses a kind of hand-set from stolen tracking that utilizes above-mentioned mobile phone to realize. The present invention can start stolen following function after hand-set from stolen, the current SIM of this mobile phone number and current location thereof are sent to the default alarm number of validated user in the mode of note, this will extremely be conducive to public security department fights crime, thereby retrieves as much as possible user's loss.

Description

Mobile phone and hand-set from stolen tracking
Technical field
The present invention relates to a kind of mobile phone, particularly relate to a kind of mobile phone and hand-set from stolen tracking.
Background technology
Along with the raising of social economy's level and the development of mechanics of communication, the communication products such as mobile phone are non-Often be deep into widely in the common people's daily life. People can use mobile phone to complete a lot of important thingsFeelings, for example, store Bank Account Number, address list and schedule etc. Thus, mobile phone becomes graduallyFor an inseparable part in people's life, but problem of the thing followed is that mobile phone is as easy as rolling off a logStolen, on crowded bus, on subway or in lively market, mobile phone is easy to not know notFeel and stolen by offender. The stolen direct property loss that first can cause user of mobile phone, more serious, offender also may utilize the userspersonal information that stores in mobile phone, even user kith and kin orClient's personal information is engaged in illegal activity, thereby gives user or its kith and kin further, client causes moreAdd great direct property. Therefore, if can, after hand-set from stolen, obtain in timeAbout the position of mobile phone or the current SIM of mobile phone (SubscriberIdentityModule, user's identificationModule) information of card number etc., will extremely be conducive to public security department and fight crime, thereby draw as much as possibleThe loss at reuse family.
Summary of the invention
The technical problem to be solved in the present invention be for overcome in prior art when user's hand-set from stolen itAfter, user is just difficult to reentry about the defect of the current information of mobile phone, provide one can stolen itAfter feed back in time mobile phone and a kind of corresponding mobile phone quilt of its current SIM number and current location thereofSteal tracking.
The present invention solves above-mentioned technical problem by following technical proposals: a kind of mobile phone, it comprisesOne SMS module and a GPS (GlobalPositioningSystem, global positioning system) module, itsFeature is, this mobile phone also comprises a stolen tracking module, and this stolen tracking module comprises: one deposits safelyStorage district, for storing a safe note, a security password and at least one alarm number; One safe note is sentencedDisconnected module, for judging whether the note that this SMS module receives is this safe note, if not,Call this SMS module and show this note, if so, call this SMS module by the current SIM of this mobile phoneThe current location that card number and this GPS module obtain is sent to this alarm number and does not show that this safety is shortLetter; One security password judge module, for judging whether user has inputted this security password, if input,Normally start this mobile phone, if not input is called this SMS module by this mobile phone after this mobile phone of startupCurrent SIM number and the current location that obtains of this GPS module be sent to this alarm number; One SIMCard judge module, for judging whether the current SIM number of this mobile phone and SIM be before this number identical,If identical, be failure to actuate, if not identical, call this security password judge module and judge that whether user is defeatedEnter this security password.
Preferably, this SIM judge module also comprises that one is set with the first timer of a safety time,For judging that from this SIM judge module the current SIM number of this mobile phone and SIM are before this number notIn the identical moment, after this safety time, just call this security password judge module and whether judge userInput this security password.
Preferably, this stolen tracking module also comprises one second timer, for judging in this safe noteWhen module judges that note that this SMS module receives is for this safe note, call with a fixed frequency that this is shortThe current location that letter module obtains the current SIM of this mobile phone number and this GPS module is sent to this reportWarning signal code; And, for the current SIM that judges this mobile phone at this SIM judge module number therewithBefore number not identical and this security password judge module of SIM judge that user does not input this security passwordTime, call this SMS module by the current SIM of this mobile phone number and this GPS module with this fixed frequencyThe current location obtaining is sent to this alarm number.
Preferably, when this SMS module is adjusted by this safe note judge module or this security password judge moduleUsed time, this SMS module in the mode of backstage note by the current SIM of this mobile phone number and this GPS mouldThe current location that piece obtains is sent to this alarm number.
Another technical scheme of the present invention is: a kind of hand-set from stolen track side who utilizes above-mentioned mobile phone to realizeMethod, its feature is, the method comprises the following steps: S1, user arranges this safe note, this safetyPassword and this alarm number; S2, this mobile phone judges whether the note receiving is this safe note, if notBe to show this note, if so, the current SIM of this mobile phone number and this GPS module obtainedCurrent location is sent to this alarm number and does not show this safe note; And this mobile phone judges currentWhether SIM number and SIM be before this number identical, is failure to actuate if identical, if not identical, sentencesWhether disconnected user has inputted this security password, normally starts this mobile phone if inputted, if not input,Send out starting after this mobile phone the current location that the current SIM of this mobile phone number and this GPS module are obtainedDeliver to this alarm number.
Preferably, at step S2In, judge current SIM number and SIM number before this from this mobile phoneIn the not identical moment, after a safety time, whether this mobile phone has just inputted this security password to userJudge.
Preferably, at step S2In, this mobile phone with a fixed frequency by the current SIM number of this mobile phoneAnd the current location that this GPS module obtains is sent to this alarm number.
Preferably, at step S2In, this mobile phone in the mode of backstage note by the current SIM of this mobile phoneThe current location that card number and this GPS module obtain is sent to this alarm number.
Positive progressive effect of the present invention is: the present invention provides stolen tracking merit for common mobile phoneCan, and adopt and guarantee that in two ways this stolen following function can start in time after hand-set from stolen,,, if offender does not change the SIM in mobile phone, validated user can utilize safe noteStart the stolen following function of this mobile phone, and if offender has changed the SIM in mobile phone, shouldMobile phone can, after the replacing action that identifies SIM, utilize security password to start the stolen of this mobile phoneFollowing function, this stolen following function by the mode with note by the current SIM of this mobile phone number and work asFront position is sent to the default alarm number of validated user, and this will extremely be conducive to the criminal of strike of public security departmentCrime, thus user's loss retrieved as much as possible.
Brief description of the drawings
Fig. 1 is the structured flowchart of this mobile phone of the present invention.
Fig. 2 is the process flowchart of this mobile phone of the present invention to note.
Fig. 3 is the process flowchart of this mobile phone of the present invention to SIM and security password.
Detailed description of the invention
Provide preferred embodiment of the present invention below in conjunction with accompanying drawing, to describe technical scheme of the present invention in detail.
As shown in Figure 1, first this mobile phone with stolen following function of the present invention comprises that one is common shortLetter module 1 and a common GPS module 2. In addition, this mobile phone also comprises a stolen tracking mouldPiece 3, this stolen tracking module 3 comprises: a secure storage areas 31, a safe note judge module 32,One security password judge module 33 and a SIM judge module 34.
This secure storage areas 31 for store the default safe note of validated user, a security password withAnd at least one alarm number, this alarm number can comprise another cell-phone number that this validated user often usesNumber 110 of code and public safety alarm platform etc. So-called secure storage areas refers to this hand hereinIn machine internal storage areas can not modifier area, can be to storage except the user who holds this security passwordOutside data in this secure storage areas are modified, other any per capita cannot be to this secure storage areasIn data modify, also cannot realize this and repair even if even the program of this mobile phone is carried out to burning againChange.
Each note that this safe note judge module 32 can receive this SMS module 1 is carried outMonitoring, judges that whether its content is in full accord with the content of this safe note. If the short message content receivingNot quite identical with the content of this safe note, this note of receiving of explanation be only one common shortLetter, now this safe note judge module 32 will call this SMS module 1 this note will be carried out normallyShow, read for validated user; And if the content of the short message content receiving and this safe note is completeUnanimously, this note that explanation receives is being just this default safe note of validated user, now this safetyNote judge module 32 will call this SMS module 1 by the current SIM of this mobile phone number and this GPSThe current location that module 2 is surveyed this mobile phone obtaining is sent to this alarm number in the lump, especially, forEnsure being kept absolutely secret of this safe short message content, and also for delinquency prevention molecule is perceived this mobile phoneStolen following function starts, and in this case, this safe note judge module 32 will be short to thisLetter module 1 is controlled, and makes it not show this safe note.
This security password judge module 33 is operation under the calling of this SIM judge module 34, itsCan whether input this security password to user judges. If this security password is inputted, sayThe active user of bright this mobile phone is validated user, and now this security password judge module 33 will can not startThe stolen following function of this mobile phone, this mobile phone will normally start; If this security password is not inputted,The active user that this mobile phone is described is disabled user, and now this security password judge module 33 will startThe stolen following function of this mobile phone, that is, call this SMS module 1 by the current SIM of this mobile phone number andThe current location that this GPS module is surveyed this mobile phone obtaining is sent to this alarm number in the lump, especially,The stolen following function of perceiving this mobile phone for delinquency prevention molecule starts, in this case,Although this disabled user does not input this security password, this mobile phone still will normally open from the teeth outwardsMoving.
This SIM judge module 34 can use the current SIM of this mobile phone number and this mobile phone before thisSIM number compare in real time. If current SIM number and SIM are before this number identical, sayThe active user of bright this mobile phone is that validated user (comprises that this validated user did not take out the feelings of SIM all the timeThe situation that condition and this validated user insert after this same SIM card is taken out again), or this handMachine is stolen but offender does not change the SIM in this mobile phone. Not stolen for this mobile phoneSituation, because this SIM judge module 34 now can't move, therefore naturally can not activate thisSecurity password judge module 33 starts the stolen following function of this mobile phone, and this mobile phone will be at this validated userAll the time do not take out in the situation of SIM and normally worked, or at this validated user by this sameIn the situation that SIM inserts after taking out again, normally start; And for stolen feelings of this mobile phoneCondition, because this SIM judge module 34 can not move equally, therefore cannot activate this security passwordJudge module 33 starts the stolen following function of this mobile phone, but will mention hereinafter, now closesMethod user will be possible to use this safe note and starts the stolen following function of this mobile phone. If current SIMNumber number not identical with SIM before this, validated user self-changeable is described SIM (also compriseThe situation that friend uses lent by this mobile phone by this validated user), or stolen and criminal of this mobile phoneCrime molecule has been changed the SIM in this mobile phone, and now, this SIM judge module 34 will call this peaceFull password judge module 33 moves. For the not stolen situation of this mobile phone, due to this mobile phoneActive user is still validated user, and therefore it will know this security password, if its inserted newAfter SIM, inputted in time this security password, this mobile phone will normally start; And for this mobile phoneStolen situation, because offender can not obtain this security password, therefore this security password is sentencedDisconnected module 33 will start the stolen following function of this mobile phone.
Preferably, due to for the purpose of safety, when the active user of this mobile phone has changed in this mobile phoneWhen SIM, this mobile phone can't be pointed out and need to input security password on operation interface, is therefore necessaryReserve the regular hour to validated user and input in time this security password, to prevent the stolen of this mobile phoneThe error starting of following function. Thus, can in this SIM judge module 34, design one and be set with oneThe first timer 341 of safety time, when this SIM judge module 34 identifies the current of this mobile phoneWhen user has changed the SIM in this mobile phone, it will wait for this safety time overtime, if overtime itBefore, this active user has inputted this security password in time, when these security password judge module 33 quiltsAfter calling, it just can not start the stolen following function of this mobile phone; And if until this safety time is overtime,This active user does not input this security password, after this security password judge module 33 is called,It just can start the stolen following function of this mobile phone.
In addition, this stolen tracking module 3 can also comprise one second timer 35, this second timerIn 35, can set a fixed frequency, for example once a day, when this safe note judge module 32 judgesWhen the note that this SMS module 1 receives is this safe note, this second timer 35 just can be controlled thisSafe note judge module 32 calls current by this mobile phone of this SMS module 1 according to this fixed frequencyThe current location that SIM number and this GPS module obtain is sent to this alarm number; And, as this SIMCard judge module 34 judge the current SIM number of this mobile phone and SIM before this number not identical and thisSecurity password judge module 33 judges when user does not input this security password, and this second timer 35 justCan control this security password judge module 33 and call this SMS module 1 by this mobile phone according to this fixed frequencyCurrent SIM number and the current location that obtains of this GPS module be sent to this alarm number, exist thusIn the situation of this hand-set from stolen, the validated user of this mobile phone and public security department just can grasp offenderWhereabouts rule, fight crime in time thereby be conducive to public security department.
In addition, the in the situation that of this hand-set from stolen, for send this mobile phone current SIM number andWhen the current location of this mobile phone, can not discovered by offender, when this SMS module 1 is by this safe noteWhen judge module 32 or this security password judge module 33 call, this SMS module 1 will be with backstage noteMode current location that the current SIM of this mobile phone number and this GPS module are obtained be sent to this reportWarning signal code.
Referring to figs. 2 and 3 shown in, this hand-set from stolen tracking of the present invention comprises the following steps:
S1, user arranges safe note, security password and alarm number.
S2, this mobile phone judges whether the note receiving is this safe note, if not show this note,If so, the current location current SIM of this mobile phone number and this GPS module being obtained is sent to thisAlarm number and do not show this safe note; And this mobile phone judges that current SIM number is with before thisWhether SIM is number identical, is failure to actuate if identical, if not identical, judges whether user has inputted thisSecurity password, normally starts this mobile phone if inputted, if not input, should after this mobile phone of startupThe current location that the current SIM of mobile phone number and this GPS module obtain is sent to this alarm number.
Below will be elaborated to this stolen tracking of the present invention by a specific embodiment.
First, user, in the time bringing into use this mobile phone for the first time, just should arrange peace in time in this mobile phoneFull note, security password and alarm number, these important informations will be stored in above-mentioned safety storingIn district 31, and in order to ensure the confidentiality of this safe note and this security password and prevent legal useFamily is forgotten, and this safe note and this security password must have certain complexity, butMust have and certain write rule so that this validated user is remembered, for example, can willThe content of safe note is set to " * sfsffs8244fafaffsfsfwsfsfe ", and this security password is establishedBe set to " 8444lkj ".
Under the normal operating conditions of this mobile phone, this mobile phone to the processing procedure of the note receiving as Fig. 2Shown in:
Step 100, this mobile phone receives the note from another mobile phone.
Step 101, this mobile phone judges that whether the content of this note is in full accord with the content of this safe note,If not quite identical, perform step 102; If in full accord, perform step 103.
Step 102, this mobile phone normally shows this note.
Step 103, this mobile phone does not show this note, and on backstage by the current SIM number of this mobile phoneAnd the current location of this mobile phone is sent to this default alarm number in the lump.
This mobile phone is to the processing procedure of SIM and security password as shown in Figure 3:
Step 200, this mobile phone judges whether current SIM number and SIM be before this number identical,If identical, perform step 201; If not identical, perform step 202.
Step 201, this mobile phone was normally worked in the situation that SIM is not removed all the time, orThe in the situation that of being reinserted into again after this same SIM card is removed, normally start.
Step 202, this mobile phone judges whether active user has inputted this security password, if input,Execution step 203; If input, does not perform step 204.
Step 203, this mobile phone normally starts.
Step 204, on this mobile phone surface normally start, but in fact can system start after withStart stolen following function, that is, this mobile phone by after startup in the mode of backstage note by current SIMThe current location of card number and this mobile phone is sent to this default alarm number in the lump.
If this mobile phone is accidentally stolen, whether change the SIM in this mobile phone according to offender, canStart the stolen following function of this mobile phone by two kinds of modes, and wherein, user can be by for example tryingThe approach of the former SIM number of dialing this mobile phone and confirm whether offender has carried out SIM moreChange.
If through dialing, find that offender does not change the SIM in this mobile phone, can utilize pre-If this safe note manually start the stolen following function of this mobile phone, that is, user can use separatelyOne mobile phone sends this default safe note to this mobile phone, and now, in step 101, this mobile phone just can be sentencedThe note and this safe note that to receive of breaking be in full accord, thereby in step 103, start this mobile phoneStolen following function, the current SIM that wherein backstage sends is number by the former SIM number that is this mobile phone.
If through dialing, find that offender has changed the SIM in this mobile phone, just user withoutCarry out any operation, as long as offender has inserted new SIM in this mobile phone, or offenderAfter this mobile phone is sold, in this mobile phone, insert new SIM by buyer, in step 202In this mobile phone can judge this disabled user and not input this security password inserting after new SIM, fromAnd in step 204, start the stolen following function of this mobile phone, the current SIM number that wherein backstage sendsBy the new SIM number that is this mobile phone.
Certainly, be noted that in the normal use procedure of this mobile phone, if validated user voluntarilyChange SIM, or this mobile phone is lent to friend to be used, must insert after new SIMInput in time this security password, in case the stolen following function of this mobile phone error starting.
In sum, the present invention can start in time stolen following function after hand-set from stolen, to incite somebody to actionIt is default that the current SIM of this mobile phone number and current location thereof are sent to validated user in the mode of noteAlarm number, this will extremely be conducive to public security department fights crime, thereby retrieves as much as possible user's damageLose.
Although more than described the specific embodiment of the present invention, those skilled in the art should manageSeparate, these only illustrate, and protection scope of the present invention is limited by appended claims. ThisThe technical staff in field is not deviating under the prerequisite of principle of the present invention and essence, can be to these enforcement sidesFormula is made various changes or modifications, but these changes and amendment all fall into protection scope of the present invention.

Claims (4)

1. a mobile phone, it comprises a SMS module and a GPS module, it is characterized in that this mobile phoneAlso comprise a stolen tracking module, this stolen tracking module comprises:
One secure storage areas, for storing a safe note, a security password and at least one alarm number;
One safe note judge module, for judging whether the note that this SMS module receives is this safetyNote, if not, call this SMS module and show this note, if so, calling this SMS module willThe current location that the current SIM of this mobile phone number and this GPS module obtain be sent to this alarm number,And do not show this safe note;
One security password judge module, for judging whether user has inputted this security password, if input,Normally start this mobile phone, if not input is called this SMS module by this mobile phone after this mobile phone of startupCurrent SIM number and the current location that obtains of this GPS module be sent to this alarm number;
One SIM judge module, for judging the current SIM number of this mobile phone and SIM before thisNumber whether identical, if identical, be failure to actuate, if not identical, call this security password judge module and sentenceWhether disconnected user has inputted this security password;
This SIM judge module also comprises that one is set with the first timer of a safety time, for from thisSIM judge module judge the current SIM number of this mobile phone and SIM before this number not identical timeCarve and start, after this safety time, just call this security password judge module and judge whether user has inputted thisSecurity password;
This stolen tracking module also comprises one second timer, for judging at this safe note judge moduleWhen the note that this SMS module receives is this safe note, calling this SMS module with a fixed frequency willThe current location that the current SIM of this mobile phone number and this GPS module obtain is sent to this alarm number;And, for judge the current SIM number of this mobile phone and SIM before this at this SIM judge moduleNot identical and this security password judge module of card number judges when user does not input this security password, solid with thisThat determines that this SMS module of frequency coordination obtains the current SIM of this mobile phone number and this GPS module is currentPosition is sent to this alarm number.
2. mobile phone as claimed in claim 1, is characterized in that, when this SMS module by this safety shortWhen letter judge module or this security password judge module call, this SMS module will in the mode of backstage noteThe current location that the current SIM of this mobile phone number and this GPS module obtain is sent to this alarm number.
3. a hand-set from stolen tracking that utilizes the mobile phone described in claim 1 to realize, its featureBe, the method comprises the following steps:
S1, user arranges this safe note, this security password and this alarm number;
S2, this mobile phone judges whether the note receiving is this safe note, if not show this note,If so, the current location current SIM of this mobile phone number and this GPS module being obtained is sent to thisAlarm number and do not show this safe note; And this mobile phone judges that current SIM number is with before thisWhether SIM is number identical, is failure to actuate if identical, if not identical, judges whether user has inputted thisSecurity password, normally starts this mobile phone if inputted, if not input, should after this mobile phone of startupThe current location that the current SIM of mobile phone number and this GPS module obtain is sent to this alarm number;
At step S2In, judge that from this mobile phone current SIM number and SIM are before this number not identicalIn the moment, after a safety time, whether this mobile phone has just been inputted this security password to user and has been sentencedDisconnected;
At step S2In, this mobile phone with a fixed frequency by the current SIM of this mobile phone number and this GPSThe current location that module obtains is sent to this alarm number.
4. hand-set from stolen tracking as claimed in claim 3, is characterized in that, at step S2In,What this mobile phone obtained the current SIM of this mobile phone number and this GPS module in the mode of backstage note works asFront position is sent to this alarm number.
CN201010220191.4A 2010-07-06 2010-07-06 Mobile phone and hand-set from stolen tracking Expired - Fee Related CN102316407B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201010220191.4A CN102316407B (en) 2010-07-06 2010-07-06 Mobile phone and hand-set from stolen tracking

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201010220191.4A CN102316407B (en) 2010-07-06 2010-07-06 Mobile phone and hand-set from stolen tracking

Publications (2)

Publication Number Publication Date
CN102316407A CN102316407A (en) 2012-01-11
CN102316407B true CN102316407B (en) 2016-05-18

Family

ID=45429157

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201010220191.4A Expired - Fee Related CN102316407B (en) 2010-07-06 2010-07-06 Mobile phone and hand-set from stolen tracking

Country Status (1)

Country Link
CN (1) CN102316407B (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103595851A (en) * 2012-08-16 2014-02-19 联芯科技有限公司 Personal-information leakage-proof method for mobile terminal and mobile terminal
CN104486727A (en) * 2014-12-25 2015-04-01 上海闻泰电子科技有限公司 Mobile phone anti-theft method and system based on Android system
CN104853013B (en) * 2015-04-21 2019-06-21 努比亚技术有限公司 A kind of mobile terminal and its theft preventing method and device
CN105142120A (en) * 2015-08-10 2015-12-09 闻泰通讯股份有限公司 Mobile phone anti-theft system
CN105516500B (en) * 2015-12-14 2019-02-19 广东小天才科技有限公司 A kind of method and system selecting equipment mode
CN105959471A (en) * 2016-04-27 2016-09-21 上海斐讯数据通信技术有限公司 Method and terminal for automatic verification and alarming
CN105827857B (en) * 2016-05-06 2019-06-25 北京珠穆朗玛移动通信有限公司 A kind of method that mobile terminal is anti-lost and mobile terminal
CN105979491A (en) * 2016-05-09 2016-09-28 北京邮电大学 SIM card remote control method, intelligent terminal and server
CN106874805A (en) * 2017-01-16 2017-06-20 北京奇虎科技有限公司 A kind of data guard method, device and mobile terminal
CN108490390B (en) * 2018-02-28 2022-05-17 北京理工大学 Mobile magnetic source positioning device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101039346A (en) * 2006-03-16 2007-09-19 上海晨兴电子科技有限公司 Handset anti-theft method, equipment and communication terminal having the same
CN101287234A (en) * 2008-05-26 2008-10-15 德信无线通讯科技(北京)有限公司 Anti-theft method and device for mobile communication terminal
CN101291502A (en) * 2008-06-16 2008-10-22 内蒙古电子信息职业技术学院 Anti-theft method for mobile phone
CN101459721A (en) * 2007-12-11 2009-06-17 上海晨兴电子科技有限公司 Method and device for anti-theft tracking of mobile phone

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100557132B1 (en) * 2003-10-07 2006-03-03 삼성전자주식회사 Mobile equipment for protection of private information and method therein

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101039346A (en) * 2006-03-16 2007-09-19 上海晨兴电子科技有限公司 Handset anti-theft method, equipment and communication terminal having the same
CN101459721A (en) * 2007-12-11 2009-06-17 上海晨兴电子科技有限公司 Method and device for anti-theft tracking of mobile phone
CN101287234A (en) * 2008-05-26 2008-10-15 德信无线通讯科技(北京)有限公司 Anti-theft method and device for mobile communication terminal
CN101291502A (en) * 2008-06-16 2008-10-22 内蒙古电子信息职业技术学院 Anti-theft method for mobile phone

Also Published As

Publication number Publication date
CN102316407A (en) 2012-01-11

Similar Documents

Publication Publication Date Title
CN102316407B (en) Mobile phone and hand-set from stolen tracking
US10657238B2 (en) Systems and methods for identifying unauthorized users of an electronic device
AU2014202775B2 (en) Privacy management for tracked devices
US11288107B2 (en) Selective obfuscation of notifications
CN102739868A (en) Mobile terminal loss processing method and system
CN103095658A (en) Account login method and system
CN103455771A (en) System and method for remotely initiating lost mode on a computing device
WO2002012985B1 (en) Personal data device and protection system and method for storing and protecting personal data
CN104902074B (en) A kind of mobile phone information safety management method based on more permission modes
WO2006092446A1 (en) Method for making secure a transaction with a payment card, and center for authorizing implementation of said method
CN105165079A (en) Portable terminal, information management system, information management device, information management method, program, and storage medium
CN102045710A (en) Terminal and method for automatically changing password
CN1154389C (en) Shutdown restriction method for shutdown restricted safety mobile terminal
JP6818309B1 (en) Deadline management server, agent program and terminal lending system
CN103858133A (en) Information management system and information management method
CN107292208B (en) Anti-theft method and device for mobile terminal
CN110049490B (en) Safety protection method and device for wearable equipment, wearable equipment and medium
WO2010067263A2 (en) A system for protection and backup of information in a mobile cell unit
JPH08314805A (en) System for preventing portable radio terminal from being illegally used and method for executing the same
CN1980460A (en) Mobile terminal information resource safety security control and realizing method
CN101374171A (en) Fingerprint feedback method against mobile phone loss
CN111556272A (en) Video communication monitoring method and system
WO2021056767A1 (en) Information processing method, mobile terminal and computer storage medium
CN105635156A (en) Large distributed financial terminal system
CN106851562A (en) It is a kind of prevent mobile phone lose after leakage of content method and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20160518

Termination date: 20200706

CF01 Termination of patent right due to non-payment of annual fee