CN102571163A - Method and system for detecting stealing of communication equipment - Google Patents

Method and system for detecting stealing of communication equipment Download PDF

Info

Publication number
CN102571163A
CN102571163A CN2011104314432A CN201110431443A CN102571163A CN 102571163 A CN102571163 A CN 102571163A CN 2011104314432 A CN2011104314432 A CN 2011104314432A CN 201110431443 A CN201110431443 A CN 201110431443A CN 102571163 A CN102571163 A CN 102571163A
Authority
CN
China
Prior art keywords
communication equipment
detected
inquiry message
stolen
feedback information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2011104314432A
Other languages
Chinese (zh)
Inventor
龙腾
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Hehe Information Technology Development Co Ltd
Original Assignee
Shanghai Hehe Information Technology Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Hehe Information Technology Development Co Ltd filed Critical Shanghai Hehe Information Technology Development Co Ltd
Priority to CN2011104314432A priority Critical patent/CN102571163A/en
Publication of CN102571163A publication Critical patent/CN102571163A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention provides a method and a system for detecting the stealing of communication equipment. The method comprises the following steps of: transmitting query information to the communication equipment to be detected on the basis of a short-distance communication protocol, and judging whether feedback information is received from the communication equipment to be detected or not or whether a difference between the transmission time of the query information and the receiving time of the feedback information exceeds a preset time threshold value or not to judge whether the communication equipment to be detected is stolen or not. Therefore, a user can timely perceive the stealing of own communication equipment.

Description

Detect the whether stolen method and system of communication equipment
Technical field
The present invention relates to the communications field, particularly relate to a kind of whether stolen method and system of communication equipment that detect.
Background technology
The communication equipment that has radio communication function has now begun to be widely used by people, such as, mobile phone, panel computer, notebook computer, small-sized music player etc.These communication equipment builds are less, be easy to carry, for people's trip provides convenience.Yet these communication equipments are often all expensive, therefore are easy to become the target that the burglar pays close attention to, in case stolen the equipment of being not only of user's loss itself, the related significant data that is stored in the equipment that lost.Therefore, how can detect in time whether they stolen, so that follow the trail of as early as possible or report a case to the security authorities, be those skilled in the art's problems to be solved.
Summary of the invention
Whether stolen the shortcoming of prior art in view of the above the object of the present invention is to provide and a kind ofly detect communication equipment method and system, so that it is stolen in time to detect communication equipment.
For realizing above-mentioned purpose and other relevant purposes; Whether stolen the present invention provide a kind of communication equipment method that detects; It comprises step at least: 1) come to send inquiry message to communication equipment to be detected based on short-range communication protocols; And, confirm whether said communication equipment to be detected is stolen based on whether having from the feedback information of said communication equipment to be detected or based on the difference of the time of reception of the transmitting time of said inquiry message and feedback information whether surpass scheduled time threshold value.
Preferably; Whether stolen method also comprises step to said detection communication equipment: come to send inquiry message to communication equipment to be detected based on short-range communication protocols in advance; And based on the transmitting time of said inquiry message and receive time of reception, confirm said scheduled time threshold value from the feedback information of said communication equipment to be detected.
Preferably; Said step 1) also comprises: come to send inquiry message to communication equipment to be detected based on Bluetooth communication protocol; And, confirm whether said communication equipment to be detected is stolen based on whether having from the feedback information of said communication equipment to be detected or based on the transmitting time of said inquiry message and the time of reception of feedback information whether surpass scheduled time threshold value.
Preferably; Said step 1) also comprises: come to send inquiry message to communication equipment to be detected based on wifi communication protocol; And, confirm whether said communication equipment to be detected is stolen based on whether having from the feedback information of said communication equipment to be detected or based on the transmitting time of said inquiry message and the time of reception of feedback information whether surpass scheduled time threshold value.
Based on above-mentioned purpose; Whether stolen the present invention also provide a kind of communication equipment detection system that detects; It comprises at least: detection module; Be used for to send inquiry message, and, confirm whether said communication equipment to be detected is stolen based on whether having from the feedback information of said communication equipment to be detected or based on the difference of the time of reception of the transmitting time of said inquiry message and feedback information whether surpass scheduled time threshold value to communication equipment to be detected based on short-range communication protocols.
Preferably; Said detection system also comprises: threshold determination module; Be used for to send inquiry message based on short-range communication protocols in advance to communication equipment to be detected; And based on the transmitting time of said inquiry message and receive time of reception, confirm said scheduled time threshold value from the feedback information of said communication equipment to be detected.
Preferably; Said detection module also comprises: the first sub-detection module; Be used for to send inquiry message to communication equipment to be detected based on Bluetooth communication protocol; And, confirm whether said communication equipment to be detected is stolen based on whether having from the feedback information of said communication equipment to be detected or based on the transmitting time of said inquiry message and the time of reception of feedback information whether surpass scheduled time threshold value.
Preferably; Said detection module also comprises: the second sub-detection module; Be used for to send inquiry message to communication equipment to be detected based on wifi communication protocol; And, confirm whether said communication equipment to be detected is stolen based on whether having from the feedback information of said communication equipment to be detected or based on the transmitting time of said inquiry message and the time of reception of feedback information whether surpass scheduled time threshold value.
As stated, the method and system whether detection communication equipment of the present invention is stolen have following beneficial effect: in time whether checkout equipment is stolen, so that the user in time reports to the police.
Description of drawings
Whether stolen Fig. 1 be shown as the flow chart of detection communication equipment of the present invention method.
Whether stolen Fig. 2 be shown as the flow chart of a kind of preferred detection communication equipment of the present invention method.
Whether stolen Fig. 3 be shown as the structural representation of detection communication equipment of the present invention detection system.
Whether stolen Fig. 4 be shown as the structural representation of a kind of preferred detection communication equipment of the present invention detection system.
The element numbers explanation
1 detection system
11 detection modules
12 threshold determination module
S1, SA step
Embodiment
Below through specific instantiation execution mode of the present invention is described, those skilled in the art can understand other advantages of the present invention and effect easily by the content that this specification disclosed.The present invention can also implement or use through other different embodiment, and each item details in this specification also can be based on different viewpoints and application, carries out various modifications or change under the spirit of the present invention not deviating from.
Whether stolen Fig. 1 be shown as the flow chart of detection communication equipment of the present invention method.Wherein, detection communication equipment of the present invention whether mainly carried out by detection system by stolen method, and said detection system is to be installed in application module in the computer equipment etc.This computer equipment is a kind ofly can carry out the modernized intelligent electronic device of massive values computation and various information processings automatically, at high speed according to prior program stored, and its hardware includes but not limited to microprocessor, FPGA, DSP, embedded device etc.Said computer equipment includes but not limited to: mobile phone, PDA, notebook computer, STB or the like.
In step S1; Said detection system sends inquiry message to communication equipment to be detected based on short-range communication protocols; And, confirm whether said communication equipment to be detected is stolen based on whether having from the feedback information of said communication equipment to be detected or based on the transmitting time of said inquiry message and the time of reception of feedback information whether surpass scheduled time threshold value.
Wherein, the signal post between two equipment that communicate based on said short-range communication protocols take time with two equipment between distance relevant.Said short-range communication protocols includes but not limited to: UWB communication protocol, Zigbee communication protocol, RFID communication protocol, infrared communication protocol, Bluetooth communication protocol and wifi communication protocol etc.Said communication equipment to be detected comprises the equipment that can communicate based on the computer equipment under short-range communication protocols and the said detection system; Preferably, include but not limited to: the mobile phone that can communicate, PDA, panel computer, notebook computer etc. based on the computer equipment under short-range communication protocols and the said detection system.More preferably, the computer equipment under said communication equipment to be detected and the said detection system is the equipment that same user carries.
Particularly; Said detection system based on short-range communication protocols after communication equipment to be detected sends inquiry message; Do not surpass scheduled time threshold value if receive in the given time from the feedback information of said communication equipment to be detected or based on the difference of the time of reception of the transmitting time of said inquiry message and feedback information, then said detection system confirms that said communication equipment to be detected is stolen.
For example; Carry mobile phone a1 to be detected and the user x1 of mobile phone b1 that is mounted with said detection system behind last subway; After confirming mobile phone a1 start to be detected, start the detection system of said mobile phone b1, thus; Said detection system is regularly sent inquiry message to said mobile phone a1 to be detected based on short-range communication protocols; If after sending inquiry message, said mobile phone a1 to be detected feeds back to feedback information based on short-range communication protocols, if the difference of the time of reception that said detection system receives feedback information and the transmitting time of sending inquiry message surpasses scheduled time threshold value; Show that said mobile phone a1 to be detected has left user x1, then said detection system confirms that said mobile phone a1 to be detected is stolen.
As a kind of preferred scheme, according to the method for the invention, also comprise step SA, as shown in Figure 2.
In step SA; Said detection system sends inquiry message to communication equipment to be detected based on short-range communication protocols in advance; And based on the transmitting time of said inquiry message and receive time of reception, confirm said scheduled time threshold value from the feedback information of said communication equipment to be detected.
For example; Computer equipment b2 and communication equipment a2 to be detected all are placed in user's the pocket under the said detection system; The detection system of said computer equipment b2 is sent inquiry message based on short-range communication protocols to said communication equipment a2 to be detected; Said communication equipment a2 to be detected feeds back to feedback information based on short-range communication protocols, the detection system of then said computer equipment b2 with the difference of the transmitting time t1 of said inquiry message and the feedback time t2 that receives said feedback information as scheduled time threshold value.
Said detection system after definite scheduled time threshold value, when the user starts said detection system once more, the operation of then said detection system execution in step S1.
As another preferred version, said step S1 also comprises step S1 ' (not giving diagram).
In step S1 '; Said detection system sends inquiry message to communication equipment to be detected based on Bluetooth communication protocol; And, confirm whether said communication equipment to be detected is stolen based on whether having from the feedback information of said communication equipment to be detected or based on the transmitting time of said inquiry message and the time of reception of feedback information whether surpass scheduled time threshold value.
For example; Computer equipment and communication equipment to be detected all have function of Bluetooth communication under the said detection system; Then said detection system is directly sent inquiry message to said communication equipment to be detected based on Bluetooth communication protocol; And record sends the transmitting time t10 of inquiry message, and when said detection system was not received the feedback information from said communication equipment to be detected in the Preset Time that transmitting time t10 rises, said detection system confirmed that said communication equipment to be detected is stolen.
And for example; In the stage of confirming time threshold; Said detection system is sent inquiry message based on Bluetooth communication protocol to communication equipment a11 to be detected earlier; And based on the transmitting time t11 that sends said inquiry message and receive time of reception t12, confirm that scheduled time threshold value is Td=(t12-t11) from the feedback information of said communication equipment a11 to be detected; Subsequently; At detection-phase; Detection system is sent inquiry message to said communication equipment a11 to be detected, and record sends the transmitting time t11 ' of inquiry message, if the time of reception that receives from the feedback information of said communication equipment a11 to be detected is t12 '; And the difference of time of reception t12 ' and transmitting time t11 ' is greater than said scheduled time threshold value Td, and then said detection system confirms that said communication equipment a11 to be detected is stolen.
As another preferred version, said step S1 also comprises step S1 " (not giving diagram).
At step S1 " in; said detection system sends inquiry message to communication equipment to be detected based on wifi communication protocol; and, confirm whether said communication equipment to be detected is stolen based on whether having from the feedback information of said communication equipment to be detected or based on the transmitting time of said inquiry message and the time of reception of feedback information whether surpass scheduled time threshold value.
For example; Computer equipment and communication equipment to be detected all are arranged in same wifi network under the said detection system; Said detection system is sent inquiry message based on wifi communication protocol to communication equipment a12 to be detected; And record sends the transmitting time t13 of inquiry message; When said detection system was not received the feedback information from said communication equipment a12 to be detected in the Preset Time that said transmitting time t13 rises, said detection system confirmed that said communication equipment a12 to be detected is stolen.
And for example; In the stage of confirming time threshold; Computer equipment and communication equipment a13 to be detected are arranged in same wifi network under the said detection system; Said detection system is sent inquiry message based on wifi communication protocol to said communication equipment a13 earlier, and based on the transmitting time t15 that sends said inquiry message and receive the time of reception t16 from the feedback information of said communication equipment a13 to be detected, confirms scheduled time threshold value Td2; Subsequently; At detection-phase; Said detection system is sent inquiry message based on wifi communication protocol to said communication equipment a13 to be detected; And record send inquiry message transmitting time t17, and be t18 from the time of reception of the feedback information of said communication equipment to be detected, when the difference of time of reception t17 and transmitting time t18 during greater than said scheduled time threshold value Td2, said detection system confirms that said communication equipment a13 to be detected is stolen.
Whether stolen Fig. 3 be shown as the structural representation of detection communication equipment of the present invention detection system.Said detection system 1 comprises: detection module 11.
Said detection module 11 is used for to send inquiry message to communication equipment to be detected based on short-range communication protocols; And, confirm whether said communication equipment to be detected is stolen based on whether having from the feedback information of said communication equipment to be detected or based on the transmitting time of said inquiry message and the time of reception of feedback information whether surpass scheduled time threshold value.
Wherein, the signal post between two equipment that communicate based on said short-range communication protocols take time with two equipment between distance relevant.Said short-range communication protocols includes but not limited to: UWB communication protocol, Zigbee communication protocol, RFID communication protocol, infrared communication protocol, Bluetooth communication protocol and wifi communication protocol etc.Said communication equipment to be detected comprises the equipment that can communicate based on the computer equipment under short-range communication protocols and the said detection system; Preferably, include but not limited to: the mobile phone that can communicate, PDA, panel computer, notebook computer etc. based on the computer equipment under short-range communication protocols and the said detection system.More preferably, the computer equipment under said communication equipment to be detected and the said detection system is the equipment that same user carries.
Particularly; Said detection module 11 based on short-range communication protocols after communication equipment to be detected sends inquiry message; Do not surpass scheduled time threshold value if receive in the given time from the feedback information of said communication equipment to be detected or based on the difference of the time of reception of the transmitting time of said inquiry message and feedback information, then said detection module confirms that said communication equipment to be detected is stolen.
For example; Carry mobile phone a1 to be detected and the user x1 of mobile phone b1 that is mounted with said detection system 1 behind last subway; After confirming mobile phone a1 start to be detected, start the detection system 1 of said mobile phone b1, thus; Said detection module 11 regularly sends inquiry message to said mobile phone a1 to be detected based on short-range communication protocols; If after sending inquiry message, said mobile phone a1 to be detected feeds back to feedback information based on short-range communication protocols, if the difference of the time of reception that said detection module receives feedback information and the transmitting time of sending inquiry message surpasses scheduled time threshold value; Show that said mobile phone a1 to be detected has left user x1, then said detection module 11 confirms that said mobile phone a1 to be detected is stolen.
As a kind of preferred scheme, detection system of the present invention also comprises threshold determination module 12, and is as shown in Figure 4.
Said threshold determination module 12 is used for to send inquiry message to communication equipment to be detected based on short-range communication protocols in advance; And based on the transmitting time of said inquiry message and receive time of reception, confirm said scheduled time threshold value from the feedback information of said communication equipment to be detected.
For example; Computer equipment b2 and communication equipment a2 to be detected all are placed in user's the pocket under the said detection system 1; The threshold determination module 12 of said computer equipment b2 is sent inquiry message based on short-range communication protocols to said communication equipment a2 to be detected; Said communication equipment a2 to be detected feeds back to feedback information based on short-range communication protocols, the threshold determination module 12 of then said computer equipment b2 with the difference of the transmitting time t1 of said inquiry message and the feedback time t2 that receives said feedback information as scheduled time threshold value.
Said threshold determination module 12 is after definite scheduled time threshold value, and when the user starts said detection system 1 once more, then said detection module 11 is carried out detecting operations.
As another preferred version, said detection module 11 also comprises the first sub-detection module (not giving diagram).
The said first sub-detection module sends inquiry message to communication equipment to be detected based on Bluetooth communication protocol; And, confirm whether said communication equipment to be detected is stolen based on whether having from the feedback information of said communication equipment to be detected or based on the transmitting time of said inquiry message and the time of reception of feedback information whether surpass scheduled time threshold value.
For example; Computer equipment and communication equipment to be detected all have function of Bluetooth communication under the said detection system; The then said first sub-detection module directly sends inquiry message to said communication equipment to be detected based on Bluetooth communication protocol; And record sends the transmitting time t10 of inquiry message; When the said first sub-detection module was not received the feedback information from said communication equipment to be detected in the Preset Time that transmitting time t10 rises, the then said first sub-detection module confirmed that said communication equipment to be detected is stolen.
And for example; In the stage of confirming time threshold; Said threshold determination module 12 is sent inquiry message based on Bluetooth communication protocol to communication equipment a11 to be detected earlier; And based on the transmitting time t11 that sends said inquiry message and receive time of reception t12, confirm that scheduled time threshold value is Td=(t12-t11) from the feedback information of said communication equipment a11 to be detected; Subsequently; At detection-phase; If the said first sub-detection module sends inquiry message to said communication equipment a11 to be detected, and record sends the transmitting time t11 ' of inquiry message, if the time of reception that receives from the feedback information of said communication equipment a11 to be detected is t12 '; And the difference of time of reception t12 ' and transmitting time t11 ' is greater than said scheduled time threshold value Td, and the then said first sub-detection module confirms that said communication equipment a11 to be detected is stolen.
As another preferred version, said detection module 11 also comprises the second sub-detection module (not giving diagram).
The said second sub-detection module sends inquiry message to communication equipment to be detected based on wifi communication protocol; And, confirm whether said communication equipment to be detected is stolen based on whether having from the feedback information of said communication equipment to be detected or based on the transmitting time of said inquiry message and the time of reception of feedback information whether surpass scheduled time threshold value.
For example; Computer equipment and communication equipment to be detected all are arranged in same wifi network under the said detection system; The said second sub-detection module sends inquiry message based on wifi communication protocol to communication equipment a12 to be detected; And record sends the transmitting time t13 of inquiry message; When the said second sub-detection module was not received the feedback information from said communication equipment a12 to be detected in the Preset Time that said transmitting time t13 rises, the said second sub-detection module confirmed that said communication equipment a12 to be detected is stolen.
And for example; Computer equipment and communication equipment a13 to be detected are arranged in same wifi network under the said detection system; In the stage of confirming time threshold; Said threshold determination module 12 is sent inquiry message based on wifi communication protocol to said communication equipment a13 earlier, and based on the transmitting time t15 that sends said inquiry message and receive the time of reception t16 from the feedback information of said communication equipment a13 to be detected, confirms scheduled time threshold value Td2; Subsequently; At detection-phase; The said second sub-detection module sends inquiry message based on wifi communication protocol to said communication equipment a13 to be detected; And record send inquiry message transmitting time t17, and be t18 from the time of reception of the feedback information of said communication equipment to be detected, when the difference of time of reception t17 and transmitting time t18 during greater than said scheduled time threshold value Td2, the said second sub-detection module confirms that said communication equipment a13 to be detected is stolen.
In sum; Method and system of the present invention are owing to adopt short-range communication protocols; The user can confirm whether said communication equipment to be detected is stolen based on transmitting time of sending inquiry message and the time of reception that receives feedback information thus, so that can in time discover the stolen of communication equipment.The present invention has effectively overcome various shortcoming of the prior art and the tool high industrial utilization.
The foregoing description is illustrative principle of the present invention and effect thereof only, but not is used to limit the present invention.Any be familiar with this technological personage all can be under spirit of the present invention and category, the foregoing description is modified or is changed.Therefore, have common knowledge the knowledgeable in the affiliated such as technical field, must contain by claim of the present invention not breaking away from all equivalence modifications of being accomplished under disclosed spirit and the technological thought or changing.

Claims (8)

1. whether stolen one kind detected communication equipment method, it is characterized in that whether stolen method comprises step to said detection communication equipment at least:
1) comes to send inquiry message based on short-range communication protocols to communication equipment to be detected; And, confirm whether said communication equipment to be detected is stolen based on whether having from the feedback information of said communication equipment to be detected or based on the difference of the time of reception of the transmitting time of said inquiry message and feedback information whether surpass scheduled time threshold value.
2. the method whether detection communication equipment according to claim 1 is stolen is characterized in that whether stolen method also comprises step to said detection communication equipment:
Come to send inquiry message based on short-range communication protocols in advance, and based on the transmitting time of said inquiry message and receive time of reception, confirm said scheduled time threshold value from the feedback information of said communication equipment to be detected to communication equipment to be detected.
3. the method whether detection communication equipment according to claim 1 and 2 is stolen, it is characterized in that: said step 1) also comprises:
Come to send inquiry message based on Bluetooth communication protocol to communication equipment to be detected; And, confirm whether said communication equipment to be detected is stolen based on whether having from the feedback information of said communication equipment to be detected or based on the transmitting time of said inquiry message and the time of reception of feedback information whether surpass scheduled time threshold value.
4. the method whether detection communication equipment according to claim 1 and 2 is stolen, it is characterized in that: said step 1) also comprises:
Come to send inquiry message based on wifi communication protocol to communication equipment to be detected; And, confirm whether said communication equipment to be detected is stolen based on whether having from the feedback information of said communication equipment to be detected or based on the transmitting time of said inquiry message and the time of reception of feedback information whether surpass scheduled time threshold value.
5. whether stolen one kind detected communication equipment detection system, it is characterized in that whether stolen detection system comprises said detection communication equipment at least:
Detection module; Be used for to send inquiry message to communication equipment to be detected based on short-range communication protocols; And, confirm whether said communication equipment to be detected is stolen based on whether having from the feedback information of said communication equipment to be detected or based on the difference of the time of reception of the transmitting time of said inquiry message and feedback information whether surpass scheduled time threshold value.
6. the detection system whether detection communication equipment according to claim 5 is stolen is characterized in that said detection system also comprises:
Threshold determination module; Be used for to send inquiry message based on short-range communication protocols in advance to communication equipment to be detected; And based on the transmitting time of said inquiry message and receive time of reception, confirm said scheduled time threshold value from the feedback information of said communication equipment to be detected.
7. the detection system whether stolen according to claim 5 or 6 described detection communication equipments, it is characterized in that: said detection module also comprises:
The first sub-detection module; Be used for to send inquiry message to communication equipment to be detected based on Bluetooth communication protocol; And, confirm whether said communication equipment to be detected is stolen based on whether having from the feedback information of said communication equipment to be detected or based on the transmitting time of said inquiry message and the time of reception of feedback information whether surpass scheduled time threshold value.
8. the detection system whether stolen according to claim 5 or 6 described detection communication equipments, it is characterized in that: said detection module also comprises:
The second sub-detection module; Be used for to send inquiry message to communication equipment to be detected based on wifi communication protocol; And, confirm whether said communication equipment to be detected is stolen based on whether having from the feedback information of said communication equipment to be detected or based on the transmitting time of said inquiry message and the time of reception of feedback information whether surpass scheduled time threshold value.
CN2011104314432A 2011-12-21 2011-12-21 Method and system for detecting stealing of communication equipment Pending CN102571163A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2011104314432A CN102571163A (en) 2011-12-21 2011-12-21 Method and system for detecting stealing of communication equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2011104314432A CN102571163A (en) 2011-12-21 2011-12-21 Method and system for detecting stealing of communication equipment

Publications (1)

Publication Number Publication Date
CN102571163A true CN102571163A (en) 2012-07-11

Family

ID=46415732

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2011104314432A Pending CN102571163A (en) 2011-12-21 2011-12-21 Method and system for detecting stealing of communication equipment

Country Status (1)

Country Link
CN (1) CN102571163A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109729159A (en) * 2018-12-19 2019-05-07 新华三技术有限公司 A kind of based reminding method and device that the network equipment is lost
CN113067938A (en) * 2021-03-29 2021-07-02 西安闻泰信息技术有限公司 Method for preventing intelligent terminal from being lost and intelligent terminal

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1625068A (en) * 2004-07-13 2005-06-08 吴裕策 Over-distance alarm mobile phone
CN1921330A (en) * 2005-08-22 2007-02-28 康佳集团股份有限公司 Theft protection installation, mobile phone with anti-theft function and anti-theft method for mobile phone
CN101102376A (en) * 2006-07-05 2008-01-09 鸿富锦精密工业(深圳)有限公司 Communication device with alert function
CN201388244Y (en) * 2009-04-28 2010-01-20 哈尔滨军华科技开发有限公司 Mobile phone with anti-loss and anti-theft functions
CN101729705A (en) * 2008-11-07 2010-06-09 深圳市百特连通科技有限公司 Theftproof method and system of bluetooh mobile terminal and bluetooth headset

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1625068A (en) * 2004-07-13 2005-06-08 吴裕策 Over-distance alarm mobile phone
CN1921330A (en) * 2005-08-22 2007-02-28 康佳集团股份有限公司 Theft protection installation, mobile phone with anti-theft function and anti-theft method for mobile phone
CN101102376A (en) * 2006-07-05 2008-01-09 鸿富锦精密工业(深圳)有限公司 Communication device with alert function
CN101729705A (en) * 2008-11-07 2010-06-09 深圳市百特连通科技有限公司 Theftproof method and system of bluetooh mobile terminal and bluetooth headset
CN201388244Y (en) * 2009-04-28 2010-01-20 哈尔滨军华科技开发有限公司 Mobile phone with anti-loss and anti-theft functions

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109729159A (en) * 2018-12-19 2019-05-07 新华三技术有限公司 A kind of based reminding method and device that the network equipment is lost
CN109729159B (en) * 2018-12-19 2021-11-26 新华三技术有限公司 Method and device for reminding loss of network equipment
CN113067938A (en) * 2021-03-29 2021-07-02 西安闻泰信息技术有限公司 Method for preventing intelligent terminal from being lost and intelligent terminal

Similar Documents

Publication Publication Date Title
EP2034389A1 (en) Method and system for linking appliances
CN104038300A (en) Method, device and system for preventing mobile terminal from being lost
CN105513296A (en) Intelligent anti-lost system and method
JP2006174423A5 (en)
TWI585283B (en) Blue door lock system with emergency notification function and its operation method
WO2019010792A1 (en) Tool return method and device for smart tool rental system
CN104714815A (en) Method for updating application software and device
CN105262792A (en) Vehicle abnormality processing method and vehicle-mounted terminal
CN105516905A (en) Connection method and device of Bluetooth devices
KR102422614B1 (en) Beacon and method for detecting theft of the same
CN104135776B (en) A kind of method that cross-terminal connects, device and terminal equipment
CN103986610A (en) Communication interface matching method, device and controller
CN102571163A (en) Method and system for detecting stealing of communication equipment
AU2003204296A1 (en) Method and adapter for protocol detection in a field bus network
WO2012008755A3 (en) Apparatus and method for managing remote user interface and system for the same
CN104118394A (en) Method for preventing burglary by taking pictures through automobile navigation device
US20140300467A1 (en) System for Locating Tagged Objects
EP3136744B1 (en) Device control method and apparatus in home network system
WO2010115604A3 (en) Method and system for contactless proximity transactions
CN203283185U (en) Anti-theft tracking device of car
CN102801903A (en) Web camera with radio frequency gateway function
CN104778425A (en) Anti-theft method, anti-theft device and anti-theft system of intelligent terminal and intelligent terminal
CN105547280A (en) Navigation treatment method, and apparatus and terminal thereof
CN105025413A (en) Sound box parameter configuration method and mobile terminal
CN104933895B (en) The based reminding method and device of the vehicles

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20120711