CN102509033A - Processing method of communication terminal after being stolen and communication terminal - Google Patents
Processing method of communication terminal after being stolen and communication terminal Download PDFInfo
- Publication number
- CN102509033A CN102509033A CN201110287877XA CN201110287877A CN102509033A CN 102509033 A CN102509033 A CN 102509033A CN 201110287877X A CN201110287877X A CN 201110287877XA CN 201110287877 A CN201110287877 A CN 201110287877A CN 102509033 A CN102509033 A CN 102509033A
- Authority
- CN
- China
- Prior art keywords
- communication terminal
- server
- processing instruction
- disposal route
- video
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Studio Devices (AREA)
Abstract
The invention is suitable for the technical field of communication and provides a processing method of a communication terminal after being stolen and the communication terminal. The processing method comprises the following steps of: sending an anti-theft processing command to the communication terminal through a server; and carrying out messy code processing on data in the communication terminal by the communication terminal according to the anti-theft processing command. Therefore, after the communication terminal disclosed by the invention is stolen, when other people read the data of the communication terminal, the data is displayed in a messy code state, then the other people can be further prevented from illegally viewing or using private information of a user and safety of the information of the user can be effectively protected. In a better way, the communication terminal can automatically acquire physiological information of a suspected object according to the anti-theft processing command and uploads the physiological information of the suspected object to the server, so that possibility of getting the stolen communication terminal back by the user is increased.
Description
Technical field
The present invention relates to communication technical field, relate in particular to disposal route and the communication terminal of a kind of communication terminal after stolen.
Background technology
At present; After communication terminals such as user's mobile phone are lost, generally can be through server to communication losses terminal transmits information delete instruction, so that the user profile in the communication terminal is deleted; After avoiding other people illegally to obtain user's personal information, cause bigger infringement or hidden danger to the user.But prior art can not be obtained thief's physiologic informations such as figure and features characteristic, and this does not utilize the police to solve a case very much yet; If simultaneously with data Delete All in the communication terminal, when lost and found again as if the original subscriber, data all disappear.
Can know that to sum up the treatment technology after the existing communication terminal is stolen obviously exists inconvenience and defective, so be necessary to improve on reality is used.
Summary of the invention
To above-mentioned defective, disposal route and communication terminal after the object of the present invention is to provide a kind of communication terminal stolen, it can avoid other people illegally to check or use user's personal information, thereby has effectively protected the safety of user profile.
To achieve these goals, the disposal route after the present invention provides a kind of communication terminal stolen the treating method comprises:
Send the antitheft processing instruction through server to said communication terminal;
Said communication terminal carries out mess code with the data in the said communication terminal and handles according to said antitheft processing instruction.
According to disposal route of the present invention, saidly data in the communication terminal carried out the mess code processed steps comprise:
Through nonlinear function the data in the database of said communication terminal being carried out mess code handles.
According to disposal route of the present invention, also comprise before the said step of sending the antitheft processing instruction through server to said communication terminal:
Said communication terminal is provided with the antitheft business model in advance, to set up the interface channel between said server and the said communication terminal.
According to disposal route of the present invention, saidly further comprise to the step that said communication terminal sends the antitheft processing instruction through server:
Judge between said server and the said communication terminal and whether be in connection status;
If be in connection status, then said server sends said antitheft processing instruction to said communication terminal;
If be not in connection status, then said server regularly inquire about and said communication terminal between whether recover connection status, if recover connection status then send said antitheft processing instruction to said communication terminal.
According to disposal route of the present invention, said communication terminal carries out the mess code processed steps with the data in the said communication terminal and further comprises according to said antitheft processing instruction:
Automatically obtain the physiologic information of suspicion object;
Said communication terminal is uploaded to said server with the physiologic information of said suspicion object.
According to disposal route of the present invention, the said step of obtaining the physiologic information of suspicion object automatically comprises: automatic shooting generates picture or video;
Said communication terminal comprises the step that the physiologic information of said suspicion object is uploaded to said server:
Said communication terminal is uploaded to said server with said picture or video.
According to disposal route of the present invention, the step that said automatic shooting generates picture or video comprises:
Generate said picture or video with the silent mode automatic shooting;
Start preposition camera and/or rearmounted camera, automatic shooting generates said picture or video;
Automatic shooting generates said picture or video at interval on schedule; And/or
When said communication terminal was operated, automatic shooting generated said picture or video.
According to disposal route of the present invention, the said step of obtaining the physiologic information of suspicion object automatically also comprises:
Said communication terminal obtains the finger print information on the said communication terminal automatically according to said antitheft processing instruction;
Said communication terminal comprises the step that the physiologic information of said suspicion object is uploaded to said server:
Said communication terminal is uploaded to said server with said finger print information.
According to disposal route of the present invention, the step of the finger print information on the said automatic obtaining communication terminal comprises:
When said communication terminal is operated, obtain finger print information newly-increased on the said communication terminal automatically.
The present invention also provides a kind of communication terminal of realizing the disposal route of said communication terminal after stolen, and said communication terminal comprises:
The command reception module is used for the antitheft processing instruction that reception server is sent;
Message processing module is used for according to said antitheft processing instruction, the data in the said communication terminal is carried out mess code handle.
After stolen communication terminal of the present invention receives the antitheft processing instruction, can carry out mess code to the data in the communication terminal and handle, avoid other people illegally to check or use user's personal information, protect the safety of user profile conscientiously; If the user can give stolen communication terminal for change in the future, can also the data that said mess code is handled be recovered, avoid user profile to be deleted or destroy, thereby guaranteed completeness of user information.Preferably; Stolen terminal can obtain the physiologic information of suspicion object automatically according to the antitheft processing instruction that server is sent; For example the communication terminal automatic shooting generates image or video, obtains finger print information etc. automatically, and the physiologic information of the suspicion object that is obtained is uploaded to server automatically; The user can obtain the physiologic information of said suspicion object through server like this; And in time report to the police, thereby the possibility that the user gives stolen communication terminal for change, the security that has improved communication terminal have been increased as evidence.
Description of drawings
Fig. 1 is the structural representation of communication terminal of the present invention;
Fig. 2 is the structural representation of the preferred communication terminal of the present invention;
Fig. 3 is the structural representation of the disposal system of communication terminal of the present invention after stolen;
Fig. 4 is the process flow diagram of the disposal route of communication terminal of the present invention after stolen;
Fig. 5 is the process flow diagram of the disposal route of the preferred communication terminal of the present invention after stolen; And
Fig. 6 is the preferred flow charts that the present invention obtains the physiologic information step of suspicion object automatically.
Embodiment
In order to make the object of the invention, technical scheme and advantage clearer,, the present invention is further elaborated below in conjunction with accompanying drawing and embodiment.Should be appreciated that specific embodiment described herein only in order to explanation the present invention, and be not used in qualification the present invention.
Fig. 1 shows the structure of communication terminal of the present invention, and said communication terminal 100 can be mobile phone, PDA (Personal Digital Assistant, personal digital assistant), palm PC etc., comprises command reception module 10 and message processing module 20 at least, wherein:
Fig. 2 is the structural representation of the preferred communication terminal of the present invention, and said communication terminal 100 comprises command reception module 10, message processing module 20, information uploading module 30 and operation induction module 40, wherein:
Mess code processing sub 21 is used for the antitheft processing instruction sent according to server 200, according to pre-defined rule the data in the communication terminal 100 is carried out mess code and handles.Preferably, mess code processing module 40 is carried out mess code through nonlinear function to the data in the database of communication terminal 100 and is handled on the database aspect, and said nonlinear function can be a sin cos functions etc.
Information is obtained submodule 22, is used for obtaining the physiologic information of suspicion object automatically according to said antitheft processing instruction.For example, after communication terminal 100 was stolen, information was obtained submodule 22 automatic shootings and is generated image or videos, has probably comprised the physiologic information of the figure and features characteristic of suspicion object in this image or the video; Perhaps, information is obtained the finger print information on the submodule 22 automatic obtaining communication terminals 100, and this finger print information probably is the fingerprint characteristic that the suspicion object stays.In case obtain the physiological characteristic of suspicion object, just can effectively clue and evidence be provided directly for the later stage solving criminal cases.Certainly, the physiologic information of said suspicion object can also comprise sound, DNA physiologic informations such as (Deoxyribonucleic acid, DNAs) that any information is obtained submodule 22 and can be obtained except comprising above-mentioned figure and features characteristic, finger print information.
Information is obtained submodule 22 and is preferably included and take submodule 221 and obtain submodule 222 with fingerprint:
Take submodule 221, be used for according to said antitheft processing instruction, automatic shooting generates picture or video, because this image or video are taken in communication terminal 100 stolen backs, has therefore probably comprised the figure and features characteristic of suspicion object.Preferably, take submodule 221 and generate picture or video, be not easy like this to be discovered by the suspicion object with the silent mode automatic shooting.Perhaps, take submodule 221 and automatically snap generation picture or video on schedule at interval, for example whenever took a film,fault at a distance from 2 minutes; Or, take preposition camera and/or rearmounted camera that submodule 221 starts communication terminal 100, automatic shooting generates picture or video.The photo that preposition camera is taken very likely photographs the head portrait of suspicion object, and rearmounted camera can photograph stolen communication terminal 100 present located environment, for giving for change of communication terminal 100 given a clue.
Fingerprint obtains submodule 222, is used for according to said antitheft processing instruction, automatically the finger print information on the obtaining communication terminal 100.Because this finger print information obtains after communication terminal 100 is stolen, so this finger print information probably is that the suspicion object stays.Fingerprint obtains submodule 222 and can adopt existing fingerprint collecting unit to realize; Example and this fingerprint obtain submodule 222 can be located at the screen of communication terminal 100, keyboard or other positions, and fingerprint obtains submodule 222 and gathers the finger print information that stays on screen or the keyboard.
In one embodiment; If the screen of communication terminal 100 is in the bright screen state; Thinking very likely has the people using this communication terminal 100, then opens the preposition and rearmounted camera of communication terminal 100 automatically, and quiet shooting was carried out once in 2 minutes in every interval; And with photo upload to the server of taking 200; The photo that preposition camera is taken very likely photographs thief's head portrait, and rearmounted camera can photograph stolen communication terminal 100 residing environment, for giving for change of communication terminal 100 given a clue.
Disposal system after the present invention also preferably provides a kind of communication terminal stolen, as shown in Figure 3, said disposal system comprises communication terminal 100 and server 200, wherein:
Service log-on module 210 is used for before communication terminal 100 is stolen, and user's registration antitheft business model to the server 200 is to set up the interface channel between server 200 and the communication terminal 100.After soon communication terminal 100 will be bound the business model of should guarding against theft; When if communication terminal 100 networks are in unimpeded state; Communication terminal 100 automatic Connection Service devices 200; Then server 200 can send instruction to communication terminal 100 at any time and wait operation, so that communication terminal 100 can carry out work according to instruction.After general antitheft business model was succeeded in registration, the user just can send the antitheft processing instruction to stolen communication terminal 100 through client-requested server 200.If the business model of not guarding against theft registration, it is unsafe just sending the antitheft processing instruction.
Fig. 4 is the process flow diagram of the disposal route of communication terminal of the present invention after stolen, said disposal route can through as Fig. 1 or communication terminal 100 realizations shown in Figure 2, comprise that at least step is following:
Step S401 sends the antitheft processing instruction through server 200 to communication terminal 100.After user's communications terminal 100 was stolen, the user can operate through various clients, and request server 200 sends said antitheft processing instruction and gives communication terminal 100, so that guard against theft processing.
Step S402; Communication terminal 100 is according to said antitheft processing instruction; Data in the communication terminal 100 are carried out mess code to be handled; Preferably the data in the database of communication terminal 100 are carried out mess code and handle, obtain and use the user data of in communication terminal 100, preserving with the object malice of saving oneself from suspicion through nonlinear function.
Preferably, step S402 can comprise that also communication terminal 100 according to said antitheft processing instruction, obtains the physiologic information of suspicion object automatically.For example, communication terminal 100 automatic shootings generate image or video, have probably comprised the figure and features characteristic of suspicion object in this image or the video; Perhaps, the finger print information on the communication terminal 100 automatic obtaining communication terminals 100, this finger print information probably is the fingerprint characteristic that the suspicion object stays.Then, communication terminal 100 is uploaded to server 200 with the physiologic information of suspicion object.The user can operate through client, from server 200, obtains the physiologic information of the suspicion object of being uploaded by stolen communication terminal 100, and the user can report a case to the security authorities to police unit according to these physiologic informations, is very beneficial for the quick solving criminal cases of police.
Fig. 5 is the process flow diagram of the disposal route of the preferred communication terminal of the present invention after stolen, said disposal route can through as Fig. 1 or communication terminal 100 realizations shown in Figure 2, comprise that specifically step is following:
Step S501, communication terminal 100 is provided with the antitheft business model in advance, to set up the interface channel between server 200 and the said communication terminal 100.Preferably, communication terminal 100 is registered the antitheft business model to server 200 before stolen, to set up the interface channel between server 200 and the communication terminal 100.The user on the server 200 communication terminal 100 bound should antitheft business model after; When if communication terminal 100 networks are in unimpeded state; Communication terminal 100 automatic Connection Service devices 200, then server 200 can send instruction to communication terminal 100 at any time and wait operation.
Step S502 after user's communications terminal 100 is stolen, can send the antitheft processing instructions through various client-requested servers 200.Here, number of the account and password that server 200 can require the user to input previous setting are verified, have checking only through just sending the antitheft processing instruction, to guarantee the safe handling of antitheft business model.
Step S503 judges between server 200 and the communication terminal 100 whether be in connection status by server 200, if be in then execution in step S505 of connection status, otherwise execution in step S504.
Whether step S504, server 200 regularly recover connection status between inquiry and the communication terminal 100, if recover connection status then send the processing instructions of guarding against theft to communication terminal 100.
Step S505, server 200 sends the antitheft processing instruction to communication terminal 100, and the content of this antitheft processing instruction can be preestablished by server 200; Can certainly set by user individual; Can require stolen communication terminal 100 automatic shooting photos, obtain finger print information and/or mess code processing etc. automatically, comprise whole said three antitheft processing actions in the present embodiment; Can certainly only select one of them or two, perhaps action is handled in other antitheft.
Step S506, communication terminal 100 is according to the antitheft processing instruction, and automatic shooting generates picture or video.Because this image or video are taken in communication terminal 100 stolen backs, have therefore probably comprised the figure and features characteristic of suspicion object.Preferably, communication terminal 100 generates picture or video with the silent mode automatic shooting; Communication terminal 100 starts preposition camera and/or rearmounted camera, and automatic shooting generates picture or video; Communication terminal 100 automatically snaps at interval on schedule and generates picture or video; And/or when communication terminal 100 was operated, communication terminal 100 automatic shootings generated picture or videos.
Step S507, communication terminal 100 is uploaded to server 200 with said picture or video.
Step S508, client is obtained said picture or video from server 200, and can in time report to the police as evidence.
Step S509, communication terminal 100 is according to antitheft processing instruction, the automatically finger print information on the obtaining communication terminal 100.Preferably, when communication terminal 100 is operated, the finger print information that increases newly on the obtaining communication terminal 100 automatically.Because this finger print information obtains after communication terminal 100 is stolen, so this finger print information probably is the important evidence that the suspicion object stays.
Step S510, communication terminal 100 is uploaded to server 200 with said finger print information.
Step S511, client is obtained said finger print information from server 200, and can in time report to the police as evidence.
Step S512; Communication terminal 100 is according to said antitheft processing instruction; Data in the communication terminal 100 are carried out mess code to be handled; Preferably the data in the database of communication terminal 100 are carried out mess code and handle, obtain and use the user data of in communication terminal 100, preserving with the object malice of saving oneself from suspicion through nonlinear function.
Fig. 6 is the preferred flow charts that the present invention obtains the physiologic information step of suspicion object automatically, comprises that step is following:
Step S601 judges whether communication terminal 100 is operated, and it is operated then execution in step S603 and step S604 by being realized by operation induction module 40 as if quilt, otherwise execution in step S602.Because when the suspicion object begins operation communication terminal 100; Obtain the best chance of the physiologic information of suspicion object exactly; After operation induction module 40 senses communication terminal 100 quilt operations; Announcement information obtains submodule 22 work immediately, thereby can obtain the physiologic information of authentic and valid suspicion object.
Step S602 wouldn't handle, and continues to turn back to step S601.
Step S603, communication terminal 100 automatic shootings generate picture or video.For example, when sensing communication terminal 100 by operation, take submodule 221 automatic shootings and generate picture or video, this picture or video will comprise the figure and features characteristic of suspicion object.
Step S604, the finger print information that increases newly on the communication terminal 100 automatic obtaining communication terminals 100.For example, when sensing communication terminal 100 by operation, fingerprint obtains finger print information newly-increased on the submodule 222 automatic obtaining communication terminals 100, and can confirm that basically this newly-increased finger print information is the finger print information of suspicion object.
In sum, after stolen communication terminal of the present invention receives the antitheft processing instruction, can carry out mess code to the data in the communication terminal and handle, avoid other people illegally to check or use user's personal information, protect the safety of user profile conscientiously; If the user can give stolen communication terminal for change in the future, can also the data that said mess code is handled be recovered, avoid user profile to be deleted or destroy, thereby guaranteed completeness of user information.Preferably; Stolen terminal can obtain the physiologic information of suspicion object automatically according to the antitheft processing instruction that server is sent; For example the communication terminal automatic shooting generates image or video, obtains finger print information etc. automatically, and the physiologic information of the suspicion object that is obtained is uploaded to server automatically; The user can obtain the physiologic information of said suspicion object through server like this; And in time report to the police, thereby the possibility that the user gives stolen communication terminal for change, the security that has improved communication terminal have been increased as evidence.
Certainly; The present invention also can have other various embodiments; Under the situation that does not deviate from spirit of the present invention and essence thereof; Those of ordinary skill in the art work as can make various corresponding changes and distortion according to the present invention, but these corresponding changes and distortion all should belong to the protection domain of the appended claim of the present invention.
Claims (10)
1. the disposal route of a communication terminal after stolen is characterized in that, the treating method comprises:
Send the antitheft processing instruction through server to said communication terminal;
Said communication terminal carries out mess code with the data in the said communication terminal and handles according to said antitheft processing instruction.
2. disposal route according to claim 1 is characterized in that, saidly data in the communication terminal are carried out the mess code processed steps comprises:
Through nonlinear function the data in the database of said communication terminal being carried out mess code handles.
3. disposal route according to claim 1 is characterized in that, also comprises before the said step of sending the antitheft processing instruction through server to said communication terminal:
Said communication terminal is provided with the antitheft business model in advance, to set up the interface channel between said server and the said communication terminal.
4. disposal route according to claim 3 is characterized in that, saidly further comprises to the step that said communication terminal sends the antitheft processing instruction through server:
Judge between said server and the said communication terminal and whether be in connection status;
If be in connection status, then said server sends said antitheft processing instruction to said communication terminal;
If be not in connection status, then said server regularly inquire about and said communication terminal between whether recover connection status, if recover connection status then send said antitheft processing instruction to said communication terminal.
5. disposal route according to claim 1 is characterized in that, said communication terminal carries out the mess code processed steps with the data in the said communication terminal and further comprises according to said antitheft processing instruction:
Automatically obtain the physiologic information of suspicion object;
Said communication terminal is uploaded to said server with the physiologic information of said suspicion object.
6. disposal route according to claim 5 is characterized in that, the said step of obtaining the physiologic information of suspicion object automatically comprises: automatic shooting generates picture or video;
Said communication terminal comprises the step that the physiologic information of said suspicion object is uploaded to said server:
Said communication terminal is uploaded to said server with said picture or video.
7. disposal route according to claim 6 is characterized in that, the step that said automatic shooting generates picture or video comprises:
Generate said picture or video with the silent mode automatic shooting;
Start preposition camera and/or rearmounted camera, automatic shooting generates said picture or video;
Automatic shooting generates said picture or video at interval on schedule; And/or
When said communication terminal was operated, automatic shooting generated said picture or video.
8. disposal route according to claim 5 is characterized in that, the said step of obtaining the physiologic information of suspicion object automatically also comprises:
Said communication terminal obtains the finger print information on the said communication terminal automatically according to said antitheft processing instruction;
Said communication terminal comprises the step that the physiologic information of said suspicion object is uploaded to said server:
Said communication terminal is uploaded to said server with said finger print information.
9. disposal route according to claim 8 is characterized in that, the step of the finger print information on the said automatic obtaining communication terminal comprises:
When said communication terminal is operated, obtain finger print information newly-increased on the said communication terminal automatically.
10. the communication terminal of a realization such as each said communication terminal of claim 1~9 disposal route after stolen is characterized in that said communication terminal comprises:
The command reception module is used for the antitheft processing instruction that reception server is sent;
Message processing module is used for according to said antitheft processing instruction, the data in the said communication terminal is carried out mess code handle.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110287877XA CN102509033A (en) | 2011-09-26 | 2011-09-26 | Processing method of communication terminal after being stolen and communication terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110287877XA CN102509033A (en) | 2011-09-26 | 2011-09-26 | Processing method of communication terminal after being stolen and communication terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102509033A true CN102509033A (en) | 2012-06-20 |
Family
ID=46221116
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201110287877XA Pending CN102509033A (en) | 2011-09-26 | 2011-09-26 | Processing method of communication terminal after being stolen and communication terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102509033A (en) |
Cited By (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102843436A (en) * | 2012-09-14 | 2012-12-26 | 腾讯科技(深圳)有限公司 | Method, equipment, server and system of equipment management |
CN103634477A (en) * | 2013-12-11 | 2014-03-12 | 深圳市亚略特生物识别科技有限公司 | Method and system for preventing thievery of mobile phone with fingerprint device |
CN103632111A (en) * | 2013-12-17 | 2014-03-12 | 中科创达软件股份有限公司 | Information processing method and device |
CN103702317A (en) * | 2013-12-13 | 2014-04-02 | 北京奇虎科技有限公司 | Mobile terminal antitheft method and client |
WO2014056302A1 (en) * | 2012-10-12 | 2014-04-17 | 华为终端有限公司 | Method and device for data secrecy based on embedded universal integrated circuit card |
CN104751086A (en) * | 2015-03-04 | 2015-07-01 | 深圳市金立通信设备有限公司 | Terminal anti-theft method |
CN104751087A (en) * | 2015-03-04 | 2015-07-01 | 深圳市金立通信设备有限公司 | Terminal |
WO2015117315A1 (en) * | 2014-07-23 | 2015-08-13 | 中兴通讯股份有限公司 | Tracking method, tracking server and tracking system |
CN105095802A (en) * | 2014-04-25 | 2015-11-25 | 北京奇虎科技有限公司 | Antitheft method for smart terminal device and smart terminal device |
CN105227770A (en) * | 2015-09-23 | 2016-01-06 | 中山市晶威电子科技有限公司 | A kind of theft preventing method based on smart mobile phone |
CN105468954A (en) * | 2015-11-27 | 2016-04-06 | 东莞酷派软件技术有限公司 | Intelligent terminal retrieving method and device |
CN105491236A (en) * | 2015-12-02 | 2016-04-13 | 小米科技有限责任公司 | Terminal unlocking method and device |
CN105791222A (en) * | 2014-12-22 | 2016-07-20 | 北京壹人壹本信息科技有限公司 | Secure communication method and system and communication terminal |
WO2016123891A1 (en) * | 2015-02-02 | 2016-08-11 | 中兴通讯股份有限公司 | Antitheft processing method and device |
CN105933374A (en) * | 2016-03-30 | 2016-09-07 | 青岛海信移动通信技术股份有限公司 | Mobile terminal data backup method, system and mobile terminal |
US9462061B2 (en) | 2012-09-14 | 2016-10-04 | Tencent Technology (Shenzhen) Company Limited | Method, device, server, and system for managing devices |
CN106126984A (en) * | 2016-06-23 | 2016-11-16 | 珠海市魅族科技有限公司 | The method of adjustment of information attribute and device |
CN107153562A (en) * | 2017-06-01 | 2017-09-12 | 珠海市魅族科技有限公司 | A kind of method, device and the storage medium of control of taking pictures |
TWI630504B (en) * | 2014-09-15 | 2018-07-21 | 群邁通訊股份有限公司 | System and method of security monitoring |
CN105101141B (en) * | 2015-06-30 | 2019-05-21 | 北京奇虎科技有限公司 | A kind of method, Intelligent lost-proof type equipment and system controlling Intelligent lost-proof type equipment |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101437203A (en) * | 2007-11-13 | 2009-05-20 | 鸿富锦精密工业(深圳)有限公司 | Mobile communication equipment and message transmission method thereof |
CA2757468A1 (en) * | 2008-04-02 | 2009-10-08 | Yougetitback Limited | Method for mitigating the unauthorized use of a device |
US20100241739A1 (en) * | 2009-03-20 | 2010-09-23 | Microsoft Corporation | Mitigations for potentially compromised electronic devices |
-
2011
- 2011-09-26 CN CN201110287877XA patent/CN102509033A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101437203A (en) * | 2007-11-13 | 2009-05-20 | 鸿富锦精密工业(深圳)有限公司 | Mobile communication equipment and message transmission method thereof |
CA2757468A1 (en) * | 2008-04-02 | 2009-10-08 | Yougetitback Limited | Method for mitigating the unauthorized use of a device |
US20100241739A1 (en) * | 2009-03-20 | 2010-09-23 | Microsoft Corporation | Mitigations for potentially compromised electronic devices |
Cited By (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102843436A (en) * | 2012-09-14 | 2012-12-26 | 腾讯科技(深圳)有限公司 | Method, equipment, server and system of equipment management |
WO2014040425A1 (en) * | 2012-09-14 | 2014-03-20 | Tencent Technology (Shenzhen) Company Limited | A method, device, server, and system for managing devices |
US9462061B2 (en) | 2012-09-14 | 2016-10-04 | Tencent Technology (Shenzhen) Company Limited | Method, device, server, and system for managing devices |
US9390277B2 (en) | 2012-10-12 | 2016-07-12 | Huawei Device Co., Ltd. | Method and device for data confidentiality protection based on embedded universal integrated circuit card |
WO2014056302A1 (en) * | 2012-10-12 | 2014-04-17 | 华为终端有限公司 | Method and device for data secrecy based on embedded universal integrated circuit card |
CN103634477A (en) * | 2013-12-11 | 2014-03-12 | 深圳市亚略特生物识别科技有限公司 | Method and system for preventing thievery of mobile phone with fingerprint device |
CN103702317B (en) * | 2013-12-13 | 2017-11-10 | 北京奇虎科技有限公司 | Anti-theft method for mobile terminal and client |
CN103702317A (en) * | 2013-12-13 | 2014-04-02 | 北京奇虎科技有限公司 | Mobile terminal antitheft method and client |
CN103632111A (en) * | 2013-12-17 | 2014-03-12 | 中科创达软件股份有限公司 | Information processing method and device |
CN105095802A (en) * | 2014-04-25 | 2015-11-25 | 北京奇虎科技有限公司 | Antitheft method for smart terminal device and smart terminal device |
WO2015117315A1 (en) * | 2014-07-23 | 2015-08-13 | 中兴通讯股份有限公司 | Tracking method, tracking server and tracking system |
CN105282700A (en) * | 2014-07-23 | 2016-01-27 | 中兴通讯股份有限公司 | Tracking method, tracking server, and tracking system |
TWI630504B (en) * | 2014-09-15 | 2018-07-21 | 群邁通訊股份有限公司 | System and method of security monitoring |
CN105791222A (en) * | 2014-12-22 | 2016-07-20 | 北京壹人壹本信息科技有限公司 | Secure communication method and system and communication terminal |
WO2016123891A1 (en) * | 2015-02-02 | 2016-08-11 | 中兴通讯股份有限公司 | Antitheft processing method and device |
CN104751086A (en) * | 2015-03-04 | 2015-07-01 | 深圳市金立通信设备有限公司 | Terminal anti-theft method |
CN104751087A (en) * | 2015-03-04 | 2015-07-01 | 深圳市金立通信设备有限公司 | Terminal |
CN105101141B (en) * | 2015-06-30 | 2019-05-21 | 北京奇虎科技有限公司 | A kind of method, Intelligent lost-proof type equipment and system controlling Intelligent lost-proof type equipment |
CN105227770A (en) * | 2015-09-23 | 2016-01-06 | 中山市晶威电子科技有限公司 | A kind of theft preventing method based on smart mobile phone |
CN105468954A (en) * | 2015-11-27 | 2016-04-06 | 东莞酷派软件技术有限公司 | Intelligent terminal retrieving method and device |
CN105491236A (en) * | 2015-12-02 | 2016-04-13 | 小米科技有限责任公司 | Terminal unlocking method and device |
CN105933374A (en) * | 2016-03-30 | 2016-09-07 | 青岛海信移动通信技术股份有限公司 | Mobile terminal data backup method, system and mobile terminal |
CN106126984A (en) * | 2016-06-23 | 2016-11-16 | 珠海市魅族科技有限公司 | The method of adjustment of information attribute and device |
CN107153562A (en) * | 2017-06-01 | 2017-09-12 | 珠海市魅族科技有限公司 | A kind of method, device and the storage medium of control of taking pictures |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102509033A (en) | Processing method of communication terminal after being stolen and communication terminal | |
US10657238B2 (en) | Systems and methods for identifying unauthorized users of an electronic device | |
US10348726B2 (en) | Online identity verification platform and process | |
US10390203B2 (en) | Multimedia centric adaptive emergency response messaging apparatus and method | |
US8483654B2 (en) | System and method for reporting and tracking incidents with a mobile device | |
CN103634477B (en) | There is theft preventing method and the system of the mobile phone of fingerprint device | |
CN105591744B (en) | A kind of genuine cyber identification authentication method and system | |
JP2013538384A (en) | Device communication | |
US7774023B2 (en) | System and method for associating device information with digital images | |
US20160149886A1 (en) | Method, device and system for account recovery with a durable code | |
AU2021282382A1 (en) | A Method and System for Reporting, Securing and Controlling Mobile Phones Which are Lost (Misplaced\Stolen) | |
CN108573554A (en) | A kind of automatic identification alarm method and system based on face lock | |
JP2017046193A (en) | Camera system enabling privacy protection | |
JP5150572B2 (en) | Privacy protection system and privacy protection method | |
JP2020201915A (en) | General purpose id issuance management system | |
CN202503545U (en) | Account security application system | |
US20210366216A1 (en) | Video Doorbell Visitor Filtration Apparatuses and Date-Time System Methods of Operation | |
JP2011223364A (en) | Moving image security authentication system | |
KR20130005469A (en) | A service method for simultaneous exchange of personal information and system for the same | |
KR101458365B1 (en) | Video recoder voice alarm system and operating method thereof | |
AU2013101014A4 (en) | A Method for Reporting, Securing and Controlling Mobile Phones Which are Lost (Misplaced\Stolen) | |
AU2013101013A4 (en) | A Method for Reporting, Securing and Controlling Mobile Phones Which are Lost (Misplaced\Stolen) | |
US11183035B2 (en) | Video doorbell visitor filtration apparatuses and date-time system methods of operation | |
KR20140002863A (en) | Service system of safety home-coming and method thereof | |
JP2017062701A (en) | Content sharing system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20120620 |