CN102457511A - Method for fundamentally preventing notebook computer from being stolen by using mobile phone - Google Patents

Method for fundamentally preventing notebook computer from being stolen by using mobile phone Download PDF

Info

Publication number
CN102457511A
CN102457511A CN2010105310928A CN201010531092A CN102457511A CN 102457511 A CN102457511 A CN 102457511A CN 2010105310928 A CN2010105310928 A CN 2010105310928A CN 201010531092 A CN201010531092 A CN 201010531092A CN 102457511 A CN102457511 A CN 102457511A
Authority
CN
China
Prior art keywords
computer
address
notebook computer
network
stolen
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2010105310928A
Other languages
Chinese (zh)
Inventor
赵亮兵
董维
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN2010105310928A priority Critical patent/CN102457511A/en
Publication of CN102457511A publication Critical patent/CN102457511A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention discloses a method and a system for fundamentally preventing a notebook computer from being stolen by using a mobile phone. When the notebook computer is used for surfing the Internet, a network company can inform a notebook computer owner if finding that an Internet protocol (IP) address is changed; the notebook computer owner can select to allow the notebook computer to keep surfing the Internet according to an actual situation; and if believing that the notebook computer is stolen, the notebook computer owner can stop the notebook computer surfing the Internet. The whole process is just a process for identifying and comparing the IP address; meanwhile, the notebook computer owner can know whether the notebook computer is in a safe state by virtue of mobile phone short messages; and the using cost of the notebook computer owner cannot be increased.

Description

Fundamentally solve the stolen method of notebook computer with mobile phone
TECHNICAL FIELD OF THE INVENTION:
The present invention relates to security fields, prevent the generation of the stolen incident of notebook computer through mobile phone.
The technical background of invention:
At present, the information technology fast development, notebook computer is because light weight, and volume is little, and advantage such as be easy to carry offers convenience to people in the productive life various aspects.But these advantages just because of notebook computer are easy to utilized by some lawless persons, and therefore, the stolen incident of notebook computer both domestic and external often takes place, and the safety problem of notebook computer receives great challenge.Criminal commits theft after the success, often obtains illegal wealth through pass-along deal.The safety problem of notebook computer causes very big psychological pressure for its owner, is unfavorable for the harmonious development of society.Adopt a kind of safe and reliablely, the safety of method protection notebook computer is urgent problem during current notebook computer uses simply and easily.
Summary of the invention:
The present invention is the safety that realizes protecting notebook computer through the binding of notebook computer and mobile phone, prevents the frequent generation of the stolen incident of notebook computer, keeps the social stability harmony.May further comprise the steps:
The A notebook computer owner binds the sequence number of notebook computer and my phone number before using notebook computer in advance.This information will be placed on record by network company, and the computer owner can be provided with relevant protection problem of binding.If the notebook computer owner need change the cell-phone number of binding with the computer sequence number, provide the answer of above-mentioned protection problem to change, nullify like need and bind, provide the answer of protection problem to nullify.
When B. using the notebook computer online; Reach the sequence number of the computer that is using this IP address online through network company recognition system identification IP address; And with the terminal server of this feedback information to network company; The IP address that network terminal server finds and feed back sequence number to bind earlier compares this IP address and the IP address that feeds back again, confirms whether two IP addresses are identical.
C. the comparative result of the terminal server of network company has two kinds.If comparative result is identical, then computer is surfed the Net as usual, if comparative result is inequality, then the notebook computer owner in time informs through the phone number that sequence number is bound in network company.
D. the notebook computer owner is when receiving the information of network company, can select " through " or the online of " refusal " notebook computer.
E. the notebook computer owner informs network company through mobile phone with the selection of oneself, and different selections is carried out different processing to the online of notebook computer.
The advantage of this method is when notebook computer is surfed the Net, and through the identification to IP address and notebook computer sequence number, the online of notebook computer in the time of can stopping different IP addresses arrives protection notebook computer purpose of safety.The method that adopts is the identification contrast through network company's recognition system and terminal server, informs the notebook computer owner with the mode of SMS, and whether the notebook computer owner selects to let notebook computer surf the Net normally.Whole process, the notebook computer owner can know whether the notebook computer of oneself is in a safe condition.
Description of drawings:
Accompanying drawing is that the present invention is in the method and system explanation of using mobile phone protection notebook computer.
Embodiment:
The method and the implementation step of invention mobile phone protection notebook computer safety are described below in conjunction with accompanying drawing.Can know by accompanying drawing, when being implemented in the method for using mobile phone protection notebook computer safety, mainly comprise following a few step:
1. the notebook computer owner binds the sequence number of own notebook computer and the phone number of own mobile phone before using the notebook computer online.Sequence number and cell-phone number will leave the terminal server of network company in.
2. after binding completion, because notebook computer all has a specific I P address when online.Notebook computer is after connecting network, and the recognition system of network company is discerned IP address and corresponding notebook computer sequence number automatically, and the IP address sequence number is fed back to the terminal server of network company.
3. the terminal server of network company IP address and the sequence number that can accept to feed back, and find out and IP address that the sequence number that feeds back has been bound, then IP address of binding and the IP address that feeds back are compared.
4. if two IP addresses of the terminal server of network company identification are identical, then can not send instruction, notebook computer is surfed the Net normally.
5. if two IP addresses of the terminal server of network company identification are different, then can be through informing the notebook computer owner with the phone number of sequence number binding.The notebook computer owner can know the security situation of the notebook computer of oneself in the very first time.
The notebook computer owner can select " through " or " refusal " reply network company.If the notebook computer owner thinks that the notebook computer of oneself is safe; Can select " through " answer network company; Then notebook computer is surfed the Net normally, and the terminal server of network company can be automatically be new IP address with the IP address substitution of initially binding.If if the user selects " refusal " to reply network company, network company then can stop the online of notebook computer.
A concrete embodiment is described below: when buying computer; The notebook computer owner can directly bind the sequence number and the phone number of own computer; Perhaps bought notebook computer; But not with the user of sequence number and cell-phone number binding, can arrive relevant business hall and handle the business of binding, as yet because each notebook computer has a specific sequence number.Therefore, the sequence number of notebook computer can bind together with phone number.When notebook computer is surfed the Net after binding for the first time; Network company informs that its computer of the computer owner surfs the Net; And whether ask it " through " online computing, if pass through, the terminal server of network company binds together this IP address and sequence number automatically.In the time of each later on the online; The recognition system of network company will be discerned IP address and notebook computer sequence number automatically; And this IP address and notebook computer sequence number fed back to automatically the terminal server of network company; The corresponding IP address of initially having bound of the sequence number that the terminal server of network company is found out earlier and fed back, and the IP address of binding compared with the IP address that feeds back.If both are identical, then computer online as usual, the IP address of binding is constant.If both are inequality, network company will get in touch through the phone number and the notebook computer owner with the sequence number binding in the very first time, solicited the possessory suggestion of notebook computer.The user can select " through " or " refusal " feed back to Virtual network operator.As message reply 888 expression " through ", reply 000 expression " refusal ".Select " through ", then notebook computer is normally surfed the Net, and simultaneously, system substitutes the IP address of having bound with automatically that this is new IP address.If select " refusal ", network company stops the online of notebook computer.

Claims (4)

1. the utilization mobile phone prevents the method for stolen notebook computer online, is the utilization network technology, and Network Recognition system and network terminal server can be installed additional in network company in network line; One group of preset parameter is set in network terminal server in advance; Be the sequence number of notebook computer, telephone number, IP address; Network Recognition system identification IP address and the notebook computer sequence number that uses this IP address to surf the Net; And the parameter that obtains fed back to network terminal server, network terminal server is found out the IP address of having bound with the sequence number that feeds back earlier, is compared with the IP address of feedback in this IP address then.If comparative result is identical, then computer is surfed the Net normally, if different; Network company is the advisory computer owner of IP address modification, and asks whether it agrees that computer uses new IP address online, and the computer owner is if agree; Then reply network company and agree, network company allows computer to surf the Net in new IP address then, and the IP address of number having bound with new IP address alternative sequence; And automatically new IP address and sequence number are bound,, then reply network company and disagree with if disagree with; Network company stops the online of computer. and the computer owner receives the IP place replacing of network company's computer, and the computer owner according to circumstances determines whether computer is stolen so; Whether use online,, can stop stolen online computing through network company if confirm that computer is stolen in stolen back; The so stolen computer basic functions that this computer should possess of just can not surfing the Net, so stolen computer also no one repurchases, and stolen computer loses market; In the course of time, also just fundamentally solved the safety problem of computer.
2. require according to right 1 said, the network company notice computer owner, it can be modes such as SMS, Email, speech communication that computer uses the situation of the address modification of online IP, but the applicant advises using the mode of SMS.
3. require saidly like right 1, the computer owner send to agree or dissenting instruction to network company, can be modes such as SMS, Email, speech communication, but the applicant advises using the mode of SMS.
4. requiring described network company like right 1 can be network communication companies such as China Mobile, China Netcom, China Telecom, CHINAUNICOM.
CN2010105310928A 2010-10-21 2010-10-21 Method for fundamentally preventing notebook computer from being stolen by using mobile phone Pending CN102457511A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2010105310928A CN102457511A (en) 2010-10-21 2010-10-21 Method for fundamentally preventing notebook computer from being stolen by using mobile phone

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2010105310928A CN102457511A (en) 2010-10-21 2010-10-21 Method for fundamentally preventing notebook computer from being stolen by using mobile phone

Publications (1)

Publication Number Publication Date
CN102457511A true CN102457511A (en) 2012-05-16

Family

ID=46040172

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2010105310928A Pending CN102457511A (en) 2010-10-21 2010-10-21 Method for fundamentally preventing notebook computer from being stolen by using mobile phone

Country Status (1)

Country Link
CN (1) CN102457511A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104809418A (en) * 2014-01-29 2015-07-29 纬创资通股份有限公司 Personal electronic device and personal electronic device loss protection system and method
CN109326103A (en) * 2018-10-08 2019-02-12 宁波大学 A kind of mobile intelligent terminal generation emergency signal method

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104809418A (en) * 2014-01-29 2015-07-29 纬创资通股份有限公司 Personal electronic device and personal electronic device loss protection system and method
CN104809418B (en) * 2014-01-29 2018-01-19 纬创资通股份有限公司 Personal electronic device and personal electronic device loss protection system and method
CN109326103A (en) * 2018-10-08 2019-02-12 宁波大学 A kind of mobile intelligent terminal generation emergency signal method

Similar Documents

Publication Publication Date Title
CN106340087A (en) Intelligent switch lock system based on intelligent mobile terminal
CN104270525B (en) Information processing method and information processor
CN104320412A (en) Bluetooth POS and safe Bluetooth POS connecting method and device
CN103220637A (en) Mobile phone anti-theft protection method and mobile phone anti-theft protection device
CN105307169A (en) Access method, device and system for guest network
CN101141721A (en) Safety mobile telephone based communication custom
CN104486727A (en) Mobile phone anti-theft method and system based on Android system
CN103188377A (en) Anti-theft method of mobile terminal and anti-theft mobile terminal
CN105100094B (en) A kind of solution lock control method and terminal
CN101035006B (en) Method for sending the prompt notice to the user in the instant communication process
CN102780989A (en) Method and system for preventing loss of mobile terminal
CN105827405A (en) Remotely-controlled safety lock device and remote control method thereof
CN104902074A (en) Mobile phone information security management method based on multiple authority modes
JP6383795B2 (en) Information processing method, terminal, server, communication method, and system
CN102215292B (en) System and method for controlling electronic lock by mobile phone Bluetooth module
CN104994006A (en) Back-to-back instant communication method and device based on WeChat public number
CN107743112A (en) A kind of auth method, device and system
CN110730446A (en) Login method, terminal and computer storage medium
CN101877848A (en) Mobile terminal, mobile terminal data protection method and mobile terminal monitoring system
CN105430169A (en) Method and system for controlling mobile terminal
CN102457511A (en) Method for fundamentally preventing notebook computer from being stolen by using mobile phone
CN103037374B (en) Enterprise-level intelligent mobile terminal anti-theft method
CN105516054A (en) User authentication method and user authentication device
JP2004166013A (en) Mobile terminal, mobile terminal remote control systems, and method therefor
CN103067910A (en) Remote card opening method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
DD01 Delivery of document by public notice

Addressee: Dong Wei

Document name: Notification of Publication of the Application for Invention

DD01 Delivery of document by public notice

Addressee: Dong Wei

Document name: Notification of before Expiration of Request of Examination as to Substance

DD01 Delivery of document by public notice

Addressee: Dong Wei

Document name: Notification that Application Deemed to be Withdrawn

C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20120516