CN104901941A - System and method for positioning and tracking notebook computer under BIOS (Basic Input Output System) - Google Patents

System and method for positioning and tracking notebook computer under BIOS (Basic Input Output System) Download PDF

Info

Publication number
CN104901941A
CN104901941A CN201510096050.9A CN201510096050A CN104901941A CN 104901941 A CN104901941 A CN 104901941A CN 201510096050 A CN201510096050 A CN 201510096050A CN 104901941 A CN104901941 A CN 104901941A
Authority
CN
China
Prior art keywords
client
portable terminal
side program
bios
program
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510096050.9A
Other languages
Chinese (zh)
Other versions
CN104901941B (en
Inventor
杨伟宁
田旭华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
XI'AN QINGTIAN SOFTWARE TECHNOLOGY Co Ltd
Original Assignee
XI'AN QINGTIAN SOFTWARE TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by XI'AN QINGTIAN SOFTWARE TECHNOLOGY Co Ltd filed Critical XI'AN QINGTIAN SOFTWARE TECHNOLOGY Co Ltd
Priority to CN201510096050.9A priority Critical patent/CN104901941B/en
Publication of CN104901941A publication Critical patent/CN104901941A/en
Application granted granted Critical
Publication of CN104901941B publication Critical patent/CN104901941B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Information Transfer Between Computers (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a method for positioning and tracking a portable terminal, and aims to solve the problem of positioning and tracking reliability in an existing anti-theft system. The method comprises the following steps: deploying a client bootstrap program into a BIOS (Basic Input Output System) of the portable terminal, wherein the client bootstrap program comprises a driver and a client program; when the BIOS is started, storing the client program in a disk by the driver; starting an operating system; if a corresponding client program exists in the disk, starting the client program to establish communication with a server; transmitting an equipment identifier of the portable terminal to the server by the client program for the server to discriminate; notifying the client program; and after the server receives an equipment message sent by the client program, positioning and tracking lost equipment by a centralized management background. Compared with an existing anti-theft system, the method has the advantages of simpler hardware system, more abundant positioning data, and greatly-enhanced system reliability.

Description

A kind of system and method based on notebook location tracking under BIOS
Technical field
The invention belongs to computer technology security fields, be specifically related to a kind of location tracking system ensured computer security based on Internet and method.
Background technology
Now along with science and technology constantly advances, the electronic mobile device such as notebook computer have entered huge numbers of families, and increasing user by using notebook computer to carry out work, amusement, lies fallow and study.Have the notebook computer of large storage capability, such as photo may be stored, private privacy data, for company, also may store important commercial matters information.
Due to notebook computer, to have volume little, the lightweight advantage and deeply having a preference for by user such as to be easy to carry, but also become the target that burglar steals and plunder on the other hand, according to statistics, within every 10 seconds, just has a notebook computer to lose in the world.The object of burglar: obtain the capsule information in computer, sells off computer and seldom oneself uses.
Give stolen computer for change or the important information given for change in stolen notebook has become the problem be concerned about of society, and computer network connects complicated variety, causes by the stolen notebook computer of the passive search of computer network more and more difficult.
Existing by increasing specialised hardware equipment or using ageng to carry out the stolen notebook computer information technology that location tracking is connected on the Internet, is all by internet transmission locating information.
Above-mentioned technology has obvious defect, and under normal circumstances, above-mentioned technology can ensure the normal transmission of locating information, but is reset in operating system, low lattice, when GHOST or hard disk are removed, is almost the computer equipment that can not find this loss.
The present invention eliminates the deficiencies in the prior art by distinct methods exactly, pass through the method, in extreme circumstances, stolen computer hard disc by refitting system, when by low-level formatting and GHOST, even hard disk is removed, the method still at notebook computer when networking, can search the position of this electronic equipment.
Summary of the invention
The object of the invention is the location tracking integrity problem in order to solve in existing burglary-resisting system, and then provide a kind of method for location tracking portable terminal, the method comprises:
Step 1, is deployed in the BIOS of portable terminal by client boot, and client boot comprises driver and client-side program;
Step 2, when BIOS starts, client-side program is stored in hard disk by driver;
Step 3, os starting, if there is corresponding client-side program in hard disk, then startup client-side program is set up with server and is communicated;
Step 4, the device identifier of portable terminal is sent to server by client-side program, and server carries out the state of screening portable terminal, and notifies client-side program;
Step 5, after server receives the equipment message sent by client-side program, is positioned by centralized management backstage this lost devices and follows the trail of.
Also provide a kind of system for location tracking portable terminal, this system comprises:
Multiple portable terminal, central server, multiple portable terminal and central server pass through network service;
Client bootstrap module is solidified with, comprising driver module and client modules in the BIOS firmware of portable terminal;
Above-mentioned driver module is used for analyzing the operating system partition of portable terminal and file system, obtains client modules off-position in a hard disk, reads the client modules in BIOS and the off-position deposited in hard disk;
Above-mentioned client modules communicates for setting up with server after starting, and the device identifier of portable terminal is sent to server, and the notice of reception server also sends equipment message;
Above-mentioned central server receiving equipment identifier carries out equipment examination, determine device losses state and send notice to client modules, after receiving the equipment message sent by client-side program, by centralized management background process equipment message, this lost devices is positioned and followed the trail of.
The present invention compared with prior art has following effect:
The present invention adopts program curing module in BIOS, do not need to increase extra hardware, formatted in operating system, when even hard disk is replaced, notebook still can be arrived by location tracking, and compare with existing burglary-resisting system, hardware system is more succinct, locator data is abundanter, and system reliability improves greatly.
Accompanying drawing explanation
Fig. 1 location tracking system forms schematic diagram;
Fig. 2 bios program loads flow chart;
Fig. 3 location tracking target device flow chart;
Embodiment
The following detailed description of specific embodiment of the invention
Based on Fig. 1, the system for location tracking portable terminal comprises: multiple portable terminal, central server, and multiple portable terminal and central server pass through network service; The BIOS firmware of portable terminal comprises client bootstrap module, and client bootstrap module comprises driver module and client modules; Above-mentioned driver module is used for analyzing the operating system partition of portable terminal and file system, obtains client modules off-position in a hard disk, reads the client modules in BIOS and the off-position deposited in hard disk; Above-mentioned client modules communicates for setting up with central server after starting, and the device identifier of portable terminal is sent to server, and the feedback notification of reception server also sends equipment message to server;
Screen after above-mentioned central server receiving equipment identifier, and send notice to client modules, after receiving the equipment message sent by client-side program, by centralized management backstage, this lost devices is positioned and followed the trail of.
Based on Fig. 2,3, describe the procedure of location tracking portable terminal in detail.
(1) first, in BIOS, client boot is embedded.
BIOS is the initialism of English " Basic Input Output System ", and literally, Chinese is exactly " basic input output system ".In fact, it is one group of program being cured in computer on mainboard on a rom chip, self-check program and system self-triggered program after the program of the most important basic input and output of its in store computer, system set-up information, start.Its major function provides the bottom, the most direct hardware setting and control for computer.Current BIOS is directly cured in computer hardware, becomes inalienable part on computer main board.
BIOS leaves in ROM (Read Only Memory, read-only memory).The data of ROM inside is in the manufacturing process of ROM, and entered by burning by special method in factory, content wherein can only be read to change, once burning is entered, user can only verify that whether the data of write is correct, can not change again.If discovery data has any mistake, then only giving up need not.
Based on this feature of BIOS, client boot, as one of them submodule of BIOS, defines whole bios program module.Be written in the ROM of mainboard.And be associated with in computer self-test system self-triggered program.Thus avoid stolen or lose notebook in extreme circumstances: formatted, refitting system and GHOST cause client software to be destroyed, and cannot locate and follow the trail of this notebook information.
Client boot is present in the BIOS in notebook computer, forms a set of program curing product, can not be modified and delete, and because itself and notebook core position become one, and starts before operating system.Fundamentally break away from the dependence to operating system, reached the read-write capability controlled operating system, thus complete the deployment to client-side program.
The client boot of solidifying embedding in BIOS is mainly divided into two parts, a part is the driver for controlling operating system read-write capability, can be used for analysis operation system file structure and fdisk structure, the index of location fdisk read-write part, for the deployment of client-side program is ready.Above-mentioned driver can be used for reading and writing hard disk NTFS subregion, to be installed to by the read-write capability being used for NTFS subregion in the SimpleFileSystemProtocol of UEFI BIOS to realize by the Driver Model of UEFI BIOS.
Another part is exactly client-side program, and T program Trigon.Exe is converted to binary file, compiles in BIOS, is present in bios program with binary code as the submodule of in BIOS module.Above-mentioned driver can determine client-side program off-position in a hard disk, read in the binary code of the client-side program solidified in BIOS, and be discharged in hard disk with the form of binary file, the binary code write in hard disk can by operating system identification, and can run, terminal use cannot carry out direct file operation to the binary code of write under an operating system, avoids user to the artificial deletion of client-side program in hard disk or amendment.Consider the problem of the Size of Ge Jia manufacturer BIOS, T program is completed, when writing by c language compilation, again through second-compressed, ensure that it has less binary code size, in order to avoid cause BIOS but to compile, or occur mistake when BIOS runs.
(2), when BIOS powers up startup, client boot is wherein started.
When BIOS powers up startup, trigger the loading of driver in boot in certain stage, driver starts the analysis to operating system partition and file system,
When carrying out zoned format and judging, first above-mentioned driver judges whether it is hard disk, if not then analyzing zoned format no longer further; If be hard disk, then need to judge whether zoned format is NTFS form, if it is location and release client-side program, to assigned address, if not then exiting driver, carry out os starting further.When analyzing zoned format, will resolve the structure of subregion, the standard interface function provided by driver realizes the read-write to NTFS subregion, realizes the location to specific concrete file path, and obtains other information.Analyze hard disc data by ad hoc rules, navigate to document location index, the side-play amount of file original position in a hard disk and section can be determined, calculate according to side-play amount and determine client-side program off-position.
Driver, after SimpleFileSystemProtocol installation, goes to read the T program of particular path in known NTFS subregion (i.e. determined client-side program off-position) by this agreement, if the state returned when reading is EFI_NOT_FOUND, then do not find the file under appointment NTFS subregion path, T program is not had under specified path is described, driver reads the client-side program binary code left in BIOS, according to the client-side program off-position determined, by SimpleFileSystemProtocol agreement, the T program in BIOS is written to the hard disk position (i.e. client-side program off-position) of specifying, T program is stored in hard disk with the form of binary file, this binary code can by operating system identification, and can run.
After T program being written to the hard disk position of specifying, just the stage of starting the operating system can be entered;
For the power-on operation again of terminal, in next start process, the state reading T program under specified path to be judged equally; If the state read is EFI_FOUND, then prove that T program exists, and verifies that by MD5 whether the file that zoned format has existed is consistent with the file that will write.If the result is consistent, then do not need to write separately again, if the result is inconsistent, shows the T program or destroyed on zoned format, or be modified, then need to re-write, thus ensure the true(-)running of T program energy.
Illustrated by following code and obtain hard disk information by agreement, hard disk off-position, location, side-play amount, then discharge program in BIOS to assigned address, thus complete the release work to hard disk program.
(3) after os starting, running client program.
After os starting, detect the various configuration parameter of operating system, after determining have client-side program to exist in startup item, running client program, after client-side program startup optimization, obtain the identifier of notebook computer, and the network service of foundation and central server.
The identifier of notebook computer can be obtained by multiple method.For common identifier, can use program verification code, the account of user, application program sequence number or specific password identify notebook computer.But the present invention relates to computer security due to the field of its specific use, common identifier cannot meet its requirement at specific environment identification equipment.The identifier that the present invention uses is hidden, the most difficult elimination or replacement.These identifiers comprise the hardware configuration of the mac address of nic (MAC Address) of notebook computer, BIOS sequence number, hard disk serial number and computer.These parameters are the most reliable, even if at hard disc of computer under the condition of format, also can not lose.But in formatting procedure, the data such as operating system, application program, user account will be lost.
Though several parameter can not guarantee 100% identification notebook above.Because hard disk drive can be replaced.BIOS sequence number may not have the MAC Address of even BIOS sequence number and machine can be modified by special instrument in some situation, thus causes identifier to change.But statistics shows, only have the user of only a few may take to change, this guarantees and above identifier can be taked to identify notebook computer.In the present invention, determined identifier is exactly that the physical network card address/MAC address of notebook computer is as the unique identifier identifying notebook computer.
MAC (Medium/MediaAccess Control, medium access control) MAC Address is embodied in NetworkInterfaceCard (network interface card, NIC) inner .MAC address, also hardware address is, by the long (6 bytes/byte of 48 bits/bit, 1byte=8bits), the numeral composition of 16 systems.0-23 position is called organizes unique identifier (organizationally unique), is the mark identifying LAN (local area network (LAN)) node.24-47 position is distributed by producer oneself. wherein the 48th is multicast address flag bit.The physical address of network interface card is normally by EPROM (a kind of flash chip of the burned network interface card of network interface card manufacturer, usually can be erasable by program), the address of really rely when what it stored is transmission the data computer identifying and send data and the main frame receiving data.
That is, in the physical transfer process of network bottom layer, identify main frame by physical address, then carry out transfer of data.It must be globally unique.Such as, Ethernet card, its physical address is the integer of 48bit (bit), as: 44-45-53-54-00-00, in machine-readable mode stored in host interface.Ethernet address management organization (IEEE: Institute of Electrical and Electric Engineers) is by ethernet address, the namely various combination of 48 bits, be divided into some independently continuation address groups, the producer of production ethernet nic just buys wherein one group, during concrete production, give Ethernet card by unique address one by one.MAC as notebook unique identifier is the pith of user account information, is the key point that fixed-position searching loses notebook.Universal along with the electronic equipments such as notebook and wireless network, every platform notebook all has wireless and wired two kinds of physical network card addresses now.User is when using notebook computer, and it is impartial for opening wired and wireless chance.Namely under square one, can open wireless or open and wiredly also can open physical network card in wired and wireless two simultaneously.The present invention is under the prerequisite guaranteeing accurate this electronic equipment of location tracking, and unique identifier gets the combination of wireless and wired two kinds of physical network card MAC Address.But the MAC Address of the external NIC for movement, there is unpredictalbe movement and replace possibility in it, not using its unique identifier as notebook computer.
(4) client-side program is utilized to position tracking.
In the present invention, the framework mode of location tracking system is based on client and server pattern, and client-side program needs to be undertaken coordinating and managing by central server.The information of the client transmitted by Collection and analysis divides the task of Cefpirome Culfate.Run T program under an operating system, because T program needs the support of network linking, and because of the otherness of each system, after starting up operation system starts, under now T program has been written to the path of the NTFS zoned format of specifying, needs T program to do timing detection and determine the rear operation of network linking success.
When the first running client program of user, need registered user's account, fill in user's basic condition, contact method, the relevant informations such as addresses of items of mail are also submitted to central server server using the identifier of this electronic equipment as unique identification.Together with this notebook computer unique identifier is just bundled into the relevant information of user like this, be registered in central server.This user profile and equipment bundle computer and its user account are closely connected mutually.User can be related to by the information of this registration.
For registering user, when user to find in account corresponding notebook computer stolen or lose time, can send to central server and notify that this equipment is stolen.This equipment immediately stored in stolen or loss blacklist, is started function of search by central server.
After network linking success, namely client-side program enters operation, first notebook computer unique identifier is obtained, as: after the machine MAC, submit to central server, central server receives the network information that client-side program transmits, carry out analyzing and extracting identifier, after determining relative users login account information based on identifier search, and be classified as equipment that is stolen or that lose in blacklist and compare judgement, if comparative result is consistent, then can be defined as equipment that is stolen or that lose.
The amendment of this user account information is set to lose or stolen equipment by central server, and sends a notification message and return to client-side program.After client-side program receives corresponding notification message, can find that this computer now is defined as losing or stolen equipment by central server, start the location and the tracked information that gather this notebook computer, as: the machine MAC, detection time, the machine Ip address, gateway address, external proxy server address and ethernet router, radio access point coordinate information, sends to central server, undertaken processing and storing by central server, tracking is positioned to target device.
Prior art does not just have formatted at memory, program do not have unloaded, delete or operating system when not reset, just can navigate to this equipment, and the present invention proposes runs in a variety of ways for the system of locating notebook.Even if the stolen or notebook computer lost is at client-side program, deleted or unloading or even operating system also can navigate to when being reset or format and loses or stolen notebook computer.
In extreme circumstances, equipment is stolen, and operating system is reset, whether, in time restarting machine, first the drive load program in BIOS starts, detect client deployment program and exist, discovery client-side program is lost, then discharge client-side program to assigned address.Transfer to operating system client-side program.After os starting, after assigned address has found client-side program, running client program.Client-side program still can be sent to central server process the information of this equipment collected.
All information of the lost devices collected by client-side program or stolen equipment can be used for locating this device location.The external address of loss or stolen notebook can determine external address allocation really by webserver provider (NSP).External address tracks loss or the last routing address of stolen equipment by NSP routing table, determines to lose or stolen notebook computer final outlet address.By NSP data, services, then be accurate to the particular location of loss or stolen notebook computer by the machine Ip address.By user's enrollment status information, determine the home subscriber of loss or stolen notebook computer.
The mode in addition spotting of (GPS) satellite positioning module that notebook computer connects can be activated in addition by client-side program.If this notebook computer does not have satellite navigation module, still can determine its position by other means, just in precision, there is error.Such as, to lose or stolen notebook computer is wireless starts, so just can be determined by the position of hotspot of more than at least three around it.Then the ethernet router collected by server by utilizing client-side program, accessing wirelessly point coordinates determines the position being connected to belonging network equipment.In the case, the position of loss or stolen notebook computer can be determined, but precision is lower than the coordinate determined by GPS navigation system, and its precision can higher than the geographical position of being followed the trail of by external address bit.
In order to the address location of loss or stolen equipment intuitively can be located, there is provided stolen by map denotation output location tracking at central server or lose notebook computer position, after collects to loss or stolen device coordinate information, just carry out after corresponding Coordinate Conversion is sent to map server, after map server receives corresponding coordinate, finally according to lose or the coordinate of stolen notebook computer to mark the position of this notebook computer by conspicuous color.

Claims (10)

1., for a method for location tracking portable terminal, the method comprises:
Step 1, is deployed in the BIOS of portable terminal by client boot, and client boot comprises driver and client-side program;
Step 2, when BIOS starts, client-side program is stored in hard disk by driver;
Step 3, os starting, if there is corresponding client-side program in hard disk, then startup client-side program is set up with server and is communicated;
Step 4, the device identifier of portable terminal is sent to server by client-side program, and server carries out the state of screening portable terminal, and notifies client-side program;
Step 5, after server receives the equipment message sent by client-side program, is positioned by centralized management backstage this lost devices and follows the trail of.
2., as claimed in claim 1 for the method for location tracking portable terminal, it is characterized in that,
In step 1, above-mentioned driver is used for analysis operation system file structure and fdisk structure, the index of location fdisk read-write part, hard disk NTFS subregion is read and write, by the Driver Model of UEFI BIOS the read-write capability being used for NTFS subregion is installed in the SimpleFileSystemProtocol of UEFI BIOS and realizes; Above-mentioned client-side program is that T program Trigon.Exe is converted to binary file, compiles in BIOS, is present in bios program with binary code as the submodule of in BIOS module.
3., as claimed in claim 1 for the method for location tracking portable terminal, it is characterized in that,
Step 2 comprises further, step 2-1, and during starting up BIOS, the driver started in client boot is analyzed operating system partition and file system, obtains client-side program off-position in a hard disk;
Step 2-2, client-side program is deposited off-position in a hard disk by driver.
4., as claimed in claim 3 for the method for location tracking portable terminal, it is characterized in that,
In step 2-1, first above-mentioned driver judges whether it is hard disk, if not then analyzing zoned format no longer further; If be hard disk, then need to judge whether zoned format is NTFS form, if it is location and release client-side program, to assigned address, if not then exiting driver, carry out os starting further; When analyzing zoned format, will resolve the structure of subregion, the standard interface function provided by driver realizes the read-write to NTFS subregion, realizes the location to specific concrete file path, and obtains other information; Analyze hard disc data by ad hoc rules, navigate to document location index, the side-play amount of file original position in a hard disk and section can be determined, calculate according to side-play amount and determine client-side program off-position.
5., as claimed in claim 3 for the method for location tracking portable terminal, it is characterized in that,
In step 2-2, above-mentioned driver, after SimpleFileSystemProtocol installation, removes by this agreement the program code reading client-side program off-position; If the state returned when reading is EFI_NOT_FOUND, do not find the file under appointment NTFS subregion path, then illustrate there is no client-side program under specified path, driver reads the client-side program binary code left in BIOS, according to the client-side program off-position determined, by SimpleFileSystemProtocol agreement, the client-side program binary code in BIOS is written to the off-position determined.
6., as claimed in claim 5 for the method for location tracking portable terminal, it is characterized in that,
Step 2-2 comprises further, also will judge the state reading client-side program under specified path in next start process; If the state read is EFI_FOUND, then prove that client-side program exists, verify that by MD5 whether the client-side program that zoned format has existed is consistent with the binary code that will write, if the result is consistent, then do not need to write separately again, if the result is inconsistent, show the client-side program or destroyed on zoned format, or be modified, then need to re-write.
7., as claimed in claim 1 for the method for location tracking portable terminal, it is characterized in that,
In step 4, namely client-side program enters operation, first portable terminal unique identifier is obtained, submit to central server, central server receives the network information that client-side program transmits, carry out analyzing and extracting identifier, after determining relative users login account information based on identifier search, with be classified as equipment that is stolen or that lose in blacklist and compare judgement, if comparative result is consistent, then can be defined as equipment that is stolen or that lose, send to client-side program the notification message that whether this equipment is stolen or lose.
8., as claimed in claim 1 for the method for location tracking portable terminal, it is characterized in that,
Comprise further in steps of 5, client-side program reception server notifies, if confirm portable terminal lose or stolen, then start the location and the tracked information that gather this portable terminal, comprise the machine MAC, detection time, local IP address, gateway ip address, external proxy server IP address and ethernet router, radio access point coordinate information, send to central server, undertaken processing and storing by central server, tracking is positioned to target device.
9., as claimed in claim 8 for the method for location tracking portable terminal, it is characterized in that,
Step 5 comprises further, and server positions tracking to target device, can adopt one or more modes following:
A () determines external address allocation really by webserver provider (NSP), external address tracks the last routing address of loss or stolen equipment by NSP routing table, determines to lose or stolen portable terminal final outlet address; There is provided data, services by NSP, then be accurate to the particular location of loss or stolen portable terminal by local IP address;
The mode spotting in addition of b satellite positioning module (GPS) that () is connected by client-side program activation of portable formula terminal;
C () is determined by the position of hotspot of more than at least three around portable terminal, ethernet router collected by server by utilizing client-side program, accessing wirelessly point coordinates determines the position being connected to belonging network equipment, and then determines the position of loss or stolen notebook computer.
10., for a system for location tracking portable terminal, this system comprises:
Multiple portable terminal, central server, multiple portable terminal and central server pass through network service;
Client bootstrap module is solidified with, comprising driver module and client modules in the BIOS firmware of portable terminal;
Above-mentioned driver module is used for analyzing the operating system partition of portable terminal and file system, obtains client modules off-position in a hard disk, reads the client modules in BIOS and the off-position deposited in hard disk;
Above-mentioned client modules communicates for setting up with server after starting, and the device identifier of portable terminal is sent to server, and the notice of reception server also sends equipment message;
Above-mentioned central server receiving equipment identifier carries out equipment examination, determine device losses state and send notice to client modules, after receiving the equipment message sent by client-side program, by centralized management background process equipment message, this lost devices is positioned and followed the trail of.
CN201510096050.9A 2015-03-04 2015-03-04 A kind of system and method based on notebook location tracking under BIOS Expired - Fee Related CN104901941B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510096050.9A CN104901941B (en) 2015-03-04 2015-03-04 A kind of system and method based on notebook location tracking under BIOS

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510096050.9A CN104901941B (en) 2015-03-04 2015-03-04 A kind of system and method based on notebook location tracking under BIOS

Publications (2)

Publication Number Publication Date
CN104901941A true CN104901941A (en) 2015-09-09
CN104901941B CN104901941B (en) 2018-04-06

Family

ID=54034339

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510096050.9A Expired - Fee Related CN104901941B (en) 2015-03-04 2015-03-04 A kind of system and method based on notebook location tracking under BIOS

Country Status (1)

Country Link
CN (1) CN104901941B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106878666A (en) * 2015-12-10 2017-06-20 杭州海康威视数字技术股份有限公司 The methods, devices and systems of destination object are searched based on CCTV camera
CN108388461A (en) * 2018-02-27 2018-08-10 山东超越数控电子股份有限公司 A kind of screen picture intercept method and device for firmware
CN112308577A (en) * 2020-11-06 2021-02-02 珠海格力电器股份有限公司 Loss tracking method for network selling electric appliance

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101477603A (en) * 2009-01-12 2009-07-08 杨俊生 Computer security information card based on expanded BIOS technique and operation method thereof
US20090260089A1 (en) * 2008-04-15 2009-10-15 Giga-Byte Technology Co., Ltd. Burglarproof method and system for portable computer devices
US20100299749A1 (en) * 2003-08-23 2010-11-25 Softex Incorporated Secure Booting System And Method
CN102880236A (en) * 2012-08-16 2013-01-16 苏州启智机电技术有限公司 Anti-theft computer mainboard
CN103152439A (en) * 2012-03-08 2013-06-12 林善红 Internet protocol (IP) position searching, positioning and tracking method based on computer terminal equipment

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100299749A1 (en) * 2003-08-23 2010-11-25 Softex Incorporated Secure Booting System And Method
US20090260089A1 (en) * 2008-04-15 2009-10-15 Giga-Byte Technology Co., Ltd. Burglarproof method and system for portable computer devices
CN101477603A (en) * 2009-01-12 2009-07-08 杨俊生 Computer security information card based on expanded BIOS technique and operation method thereof
CN103152439A (en) * 2012-03-08 2013-06-12 林善红 Internet protocol (IP) position searching, positioning and tracking method based on computer terminal equipment
CN102880236A (en) * 2012-08-16 2013-01-16 苏州启智机电技术有限公司 Anti-theft computer mainboard

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
飞鸟: "《不怕被盗 笔记本网络追踪应用》", 《电脑知识与技术》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106878666A (en) * 2015-12-10 2017-06-20 杭州海康威视数字技术股份有限公司 The methods, devices and systems of destination object are searched based on CCTV camera
CN108388461A (en) * 2018-02-27 2018-08-10 山东超越数控电子股份有限公司 A kind of screen picture intercept method and device for firmware
CN112308577A (en) * 2020-11-06 2021-02-02 珠海格力电器股份有限公司 Loss tracking method for network selling electric appliance
CN112308577B (en) * 2020-11-06 2024-05-14 珠海格力电器股份有限公司 Loss tracking method for network sales appliances

Also Published As

Publication number Publication date
CN104901941B (en) 2018-04-06

Similar Documents

Publication Publication Date Title
US7685322B2 (en) Port number emulation for wireless USB connections
US10346481B2 (en) Customizing operating system based on detected carrier
CN102204352B (en) Method for associating a premier femtocell with user equipment
US20020146002A1 (en) Network administration apparatus, network administrating program, network administrating method and computer network system
EP1589691B1 (en) Method, system and apparatus for managing computer identity
CN106027678A (en) Scenic region tourist flow real-time statistics and tourist flow over-limit automatic early warning system and method
CN103516547B (en) A kind of network parameter distribution method and device
CN104838618A (en) Method and apparatus for authenticating access authorization in wireless communication system
CN102833817B (en) Network access method and system based on home gateway and home gateway
CN1685663A (en) Dynamic network configuration
EP2696555B1 (en) Method and system for identifying storage device
CN103888358A (en) Routing method, device, system and gateway equipment
CN102204353B (en) Method for associating a cluster of premier femtocells with user equipment
EP3675543A1 (en) Device control method and apparatus
CN105141449A (en) Addition method and device for monitoring configuration
KR20210041074A (en) Methods, devices, systems and storage media for configuring access control policies
CN109417492A (en) A kind of network function NF management method and NF management equipment
WO2010055962A1 (en) Autonomous management method for processing unexpecting events using interaction between nodes in sensor networks
CN104901941A (en) System and method for positioning and tracking notebook computer under BIOS (Basic Input Output System)
JP2009530748A (en) Method for determining the ID of an electronic device
CN105594255A (en) Roaming network access method and apparatus
WO2019184009A1 (en) Network access method and terminal device
CN104429048A (en) Object version management
KR20080110465A (en) Method and system for generating a space signature
CN107196947B (en) Access control list setting method and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20180406

Termination date: 20200304

CF01 Termination of patent right due to non-payment of annual fee