CN104901941B - A kind of system and method based on notebook location tracking under BIOS - Google Patents
A kind of system and method based on notebook location tracking under BIOS Download PDFInfo
- Publication number
- CN104901941B CN104901941B CN201510096050.9A CN201510096050A CN104901941B CN 104901941 B CN104901941 B CN 104901941B CN 201510096050 A CN201510096050 A CN 201510096050A CN 104901941 B CN104901941 B CN 104901941B
- Authority
- CN
- China
- Prior art keywords
- client
- portable terminal
- side program
- bios
- program
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Abstract
A kind of method for location tracking portable terminal,The present invention is to solve the location tracking integrity problem in existing burglary-resisting system,Client is guided into software deployment into the BIOS of portable terminal first,Client bootstrap includes driver and client-side program,When BIOS starts,Client-side program is stored in hard disk by driver,Os starting,If corresponding client-side program in hard disk be present,Then start client-side program to communicate with server foundation,The device identifier of portable terminal is sent to server by client-side program,Server is screened,And notify client-side program,After server receives the equipment message sent by client-side program,The lost devices are positioned and followed the trail of by centralized management backstage,Compared with existing burglary-resisting system,Hardware system is more succinct,Location data is more abundant,System reliability greatly improves.
Description
Technical field
The invention belongs to computer technology security fields, and in particular to a kind of ensuring computer security based on Internet
Location tracking system and method.
Background technology
Constantly advanced now with science and technology, the electronic mobile device such as notebook computer has come into thousand ten thousand
Family, increasing user are operated by using notebook computer, amusement, leisure and study.Possess big storage capability
Notebook computer, such as photo, private privacy data, for company may be stored, it is also possible to store important business
Business information.
Because notebook computer has small volume, the advantages that being easy to carry in light weight and it is deep had a preference for by user, but separately
On the one hand also turn into the target that burglar steals and plundered, according to statistics, just there is within every 10 seconds a notebook computer to lose in the world.Surreptitiously
The purpose of thief:The capsule information in computer are obtained, computer is sold off and seldom oneself uses.
The important information given stolen computer for change or given for change in stolen notebook has become society's problem of concern, and
Computer network connects complicated variety, causes passively to search for stolen notebook computer by computer network more and more difficult.
Pass through the stolen pen for increasing specialised hardware equipment or being connected to using ageng come location tracking on internet
Remember that this computerized information technology has been present, be all by the Internet transmission location information.
Above-mentioned technology has the defects of obvious, and under normal circumstances, above-mentioned technology can ensure the normal transmission of location information, but
It is to be reset in operating system, low lattice, in the case that GHOST or hard disk are removed, can not almost finds the electricity of the loss
Brain equipment.
The present invention is exactly to eliminate the deficiencies in the prior art by distinct methods, with it, in extreme circumstances, quilt
Computer hard disc is stolen by refitting system, by low-level formatting and GHOST in the case that even hard disk is removed, this method still can be with
In notebook computer in the case of networking, the position of the electronic equipment is searched.
The content of the invention
The invention aims to solve the location tracking integrity problem in existing burglary-resisting system, and then provide a kind of
For the method for location tracking portable terminal, this method includes:
Step 1, client bootstrap is deployed in the BIOS of portable terminal, client bootstrap includes driving
Program and client-side program;
Step 2, when BIOS starts, client-side program is stored in hard disk by driver;
Step 3, os starting, if corresponding client-side program in hard disk be present, start client-side program with
Central server establishes communication;
Step 4, the device identifier of portable terminal is sent to central server by client-side program, and central server enters
Row screens the state of portable terminal, and notifies client-side program;
Step 5, after central server receives the equipment message sent by client-side program, this is lost by centralized management backstage
Equipment is lost to be positioned and followed the trail of.
A kind of system for location tracking portable terminal is also provided, the system includes:
Multiple portable terminals, central server, multiple portable terminals pass through network service with central server;
Client guiding module is solidified with the BIOS/firmware of portable terminal, including drive module and client mould
Block;
Above-mentioned drive module is used to analyze the operating system partition of portable terminal and file system, obtains client
The off-position of end module in a hard disk, read the client modules in BIOS and the off-position deposited in hard disk;
Above-mentioned client modules are used to after starting establish with central server to communicate, by the device identifier of portable terminal
Central server is sent to, the notice of central server is received and sends equipment message;
Above-mentioned central server receives portable terminal identifier and carries out equipment examination, determines portable terminal lost condition
And send and notify to client modules, after receiving the portable terminal message sent by client-side program, by centralized management backstage
Processing equipment message is positioned and followed the trail of to the portable terminal.
The present invention has the following effects that compared with prior art:
The present invention is using program curing module into BIOS, it is not necessary to increases extra hardware, in operating system by form
Change, or even in the case that hard disk is replaced, notebook is remained able to be positioned and tracked, and existing burglary-resisting system phase
Than hardware system is more succinct, and location data is more abundant, and system reliability greatly improves.
Brief description of the drawings
Fig. 1 location tracking systems form schematic diagram;
Fig. 2 bios programs load flow chart;
Fig. 3 location tracking target device flow charts;
Embodiment
The following detailed description of the specific implementation of the present invention
Based on Fig. 1, the system for location tracking portable terminal includes:Multiple portable terminals, central server are more
Individual portable terminal passes through network service with central server;The BIOS/firmware of portable terminal includes client guiding mould
Block, client guiding module include drive module and client modules;Above-mentioned drive module is used for the operation to portable terminal
System partitioning and file system are analyzed, and are obtained the off-position of client modules in a hard disk, are read the client in BIOS
End module and the off-position deposited in hard disk;Above-mentioned client modules are used to after starting establish with central server to communicate,
The device identifier of portable terminal is sent to central server, the feedback notification of central server is received and sends equipment and disappear
Cease to central server;
Screened after above-mentioned central server receiving device identifier, and to client modules send notify, receive by
After the equipment message that client-side program is sent, the lost devices are positioned and followed the trail of by centralized management backstage.
Based on Fig. 2,3, the procedure of detailed description location tracking portable terminal.
(1) first, the embedded client bootstrap in BIOS.
BIOS is the initialism of English " Basic Input Output System ", and literally rear Chinese is exactly "
Basic input output system ".In fact, it is one group of program being cured in computer on mainboard on a rom chip, and it is preserved
Self-check program and system self-starting journey after the programs of the most important basic input and output of computer, system set-up information, start
Sequence.Its major function is to provide the bottom, most direct hardware setting and control for computer.BIOS is directly solderable at present
In computer hardware, turn into inalienable part on computer main board.
BIOS is stored in ROM (Read Only Memory, read-only storage).Data inside ROM is in ROM
In manufacturing process, it is programmed into factory with special method, content therein can only be read to change, once burning is entered
Go, whether the data that user is able to validate only write-in is correct, it is impossible to changes again.If it find that data has any mistake, then
Only give up and do not have to.
Based on this features of BIOS, client bootstrap forms whole as the one of submodules of BIOS
Bios program module.It is written in the ROM of mainboard.And it is associated with computer self-test system self-triggered program.So as to avoid
It is stolen or lose notebook in extreme circumstances:It is formatted, refitting system and GHOST cause client software to be broken
It is bad, it can not position and follow the trail of the notebook information.
Client bootstrap is present in the BIOS in notebook computer, forms a set of program curing product, it is impossible to quilt
Change and delete, because itself and notebook core position are integrally formed, and start before operating system.Fundamentally break away from pair
The dependence of operating system, reach read-write capability of the control to operating system, so as to complete the deployment to client-side program.
Solidify embedded client bootstrap in BIOS and be largely divided into two parts, a part is to be used to control to operation
The driver of system read-write function, available for analysis operation system file structure and fdisk structure, position fdisk
The index of part is read and write, is ready for the deployment of client-side program.Above-mentioned driver can be used for entering hard disk NTFS subregion
Row read-write, can be installed to UEFI BIOS's by UEFI BIOS Driver Model by the read-write capability for NTFS partition
Realized in SimpleFileSystemProtocol.
Another part is exactly client-side program, and T programs Trigon.Exe is converted into binary file, is compiled into BIOS
In, it is present in as a submodule in BIOS module with binary code in bios program.Above-mentioned driver can determine that
The off-position of client-side program in a hard disk, the binary code of the client-side program solidified in BIOS is read, and with two
The form of binary file is discharged into hard disk, and the binary code write in hard disk can be identified by operating system, and can be transported
OK, terminal user can not carry out direct file operation to the binary code of write-in under an operating system, avoid user to hard
The artificial of client-side program is deleted or modified in disk.In view of each manufacturer BIOS Size the problem of, T programs are compiled by c language
Write complete, when being write, pass through second-compressed again, ensure that it has less binary code size, Yi Mianzao
Into BIOS compilings but, there is mistake when or BIOS is run.
(2) when BIOS power-up starts, client bootstrap therein is started.
When BIOS power-up starts, the loading of driver in bootstrap, driver startup pair are triggered in some stage
Operating system partition and the analysis of file system,
When carrying out zoned format judgement, above-mentioned driver is it is first determined whether be hard disk, if not then no longer entering
One step analyzes zoned format;If hard disk, then need to judge whether zoned format is NTFS format, if it is further positioning
With release client-side program to specified location, if not driver is then exited, os starting is carried out.In analysis subregion
During form, the structure of subregion is parsed, the standard interface function provided by driver is realized to NTFS partition
Read-write, the positioning to specific specific file path is realized, and obtain other information.Hard disc data is analyzed by ad hoc rules,
Navigate to document location index, it may be determined that file original position and the offset of section in a hard disk, calculated simultaneously according to offset
Determine client-side program off-position.
Driver goes to read known NTFS after SimpleFileSystemProtocol installations by this agreement
The T programs of particular path (client-side program off-position determined by i.e.) in subregion;If the state returned when reading is
EFI_NOT_FOUND, then without the file found under specified NTFS partition path, illustrate there is no T programs under specified path, drive
Program reads the client-side program binary code being stored in BIOS, according to the client-side program off-position of determination, passes through
T programs in BIOS are written to hard disk position (the i.e. client-side program specified by SimpleFileSystemProtocol agreements
Off-position), T programs are stored in hard disk in the form of binary file, and this binary code can be known by operating system
Not, and can run.
After T programs to be written to the hard disk position specified, start-up operation system stages can be entered;
For the power-on operation again of terminal, equally to judge to read T programs under specified path in next start process
State;If the state read is EFI_FOUND, proves that T programs have been present, zoned format can be verified by MD5
On whether existing file and the file to be write consistent.If the result is consistent, it is not required to separately write again, if
The result is inconsistent, shows the T programs or destroyed on zoned format, or is changed, then needs to re-write, so as to ensure
T programs can correctly be run.
Illustrated by code below and hard disk information is obtained by agreement, position hard disk off-position, offset, then
The program in BIOS is discharged to specified location, so as to complete the release work to hard disk program.
(3) after os starting, client-side program is run.
After os starting, the various configuration parameters of operating system are detected, it is determined that there is client-side program in startup item
In the presence of after, run client-side program, after client-side program startup optimization, obtain the identifier of notebook computer, and establish and in
Entreat the network service of server.
The identifier of notebook computer can be obtained with a variety of methods.For common identifier, program verification can be used
Code, the account of user, application program sequence number or specific password identify notebook computer.But the present invention is special due to it
Surely the field used is related to computer security, and common identifier can not meet its requirement in specific environment identification equipment.
The identifier that the present invention uses is hidden, is most difficult to eliminate or replaces.These identifiers include the network interface card of notebook computer
Physical address (MAC Address), BIOS sequence numbers, the hardware configuration of hard disk serial number and computer.These parameters be it is most reliable,
Even in hard disc of computer under conditions of formatting, it will not also lose.But in formatting procedure, operating system, application
The data such as program, user account will lose.
Though several parameters cannot ensure 100% identification notebook more than.Because hard disk drive can be replaced.
BIOS sequence numbers may can pass through special instrument in some situations without the even MAC Address of BIOS sequence numbers and machine
Modify, so as to cause identifier to change.But statistics shows, only the user of only a few may take change, this
Ensuring that can take symbol identified above to identify notebook computer.Identified identifier is exactly notebook computer in the present invention
Physical network card address/MAC address as identification notebook computer unique identifier.
MAC (Medium/MediaAccess Control, medium access control) MAC Address is to be embodied in
.MAC addresses inner NetworkInterfaceCard (network interface card, NIC), are also hardware address, are by 48 bits/bit length (6 words
Section/byte, 1byte=8bits), the numeral composition of 16 systems.0-23 positions are called tissue unique identifier
(organizationally unique), it is the mark for identifying LAN (LAN) node.24-47 positions are by producer oneself point
With, wherein the 48th is multicast address flag bit.The physical address of network interface card is typically by the burned network interface card of network interface card manufacturer
EPROM (a kind of flash chip, generally can be erasable by program), mark of really being rely when what it was stored is transmission data are sent
The address of the computer of data and the main frame of reception data.
It is that main frame, Ran Houjin are identified by physical address that is, during the physical transfer of network bottom layer
Row data transfer.It must be globally unique.For example Ethernet card, its physical address are the whole of 48bit (bit)
Number, such as:44-45-53-54-00-00, it is stored in a manner of machine readable in HPI.Ethernet address management organization
(IEEE:Institute of Electrical and Electric Engineers) by ethernet address, that is, the various combination of 48 bits, it is divided into some independent
Continuation address group, the producer for producing ethernet nic just buys one of which, when specifically producing, one by one by unique address assign with
Too network interface card.MAC as notebook unique identifier is the pith of user account information, is that notebook is lost in positioning search
Key point.With the popularization of the electronic equipments such as notebook and wireless network, every notebook is owned by wireless and wired now
Two kinds of physical network card addresses.For user when using notebook computer, it is impartial to open wired and wireless chance.I.e. same
When, can open it is wireless or open it is wired can also open simultaneously it is wired and wireless two in physical network card.The present invention
On the premise of guaranteeing to be accurately positioned and following the trail of the electronic equipment, unique identifier takes wireless and wired two kinds of physical network cards
The combination of MAC Address.But for the MAC Address of mobile external NIC, there is unpredictalbe movement and replace possible in it
Property, the unique identifier not using it as notebook computer.
(4) location tracking is carried out using client-side program.
The framework mode of location tracking system is based on client and central server pattern in the present invention, and client-side program needs
To be coordinated and be managed by central server.New task is assigned by the information for collecting and analyzing the client transmitted.
T programs are run under operating system, because T programs need the support of network linking, and because of the otherness of each system, in power-on operation
After system starts, now T programs are had been written under the path for the NTFS partition form specified, it is necessary to which T programs do timing inspection
Survey after determining network linking success and run.
When user runs client-side program for the first time, it is necessary to which registered user's account, fills in user's basic condition, correspondent party
The relevant informations such as formula, addresses of items of mail are simultaneously submitted to central server using the identifier of the electronic equipment as unique mark.So
The notebook computer unique identifier is just bundled into together with the relevant information of user, is registered in central server.The user
Information is mutually bundled with equipment so that computer is closely connected with its user account.Use can be related to by the information of the registration
Family.
For having registered user, when user has found that corresponding notebook computer has been stolen or lost in account
When, it can be sent to central server and notify the equipment to be stolen.Central server the equipment is stored in immediately it is stolen or
Person loses blacklist, starts function of search.
After network linking success, client-side program enters operation, obtains notebook computer unique identifier first,
Such as:After the machine MAC, central server is submitted to, central server receives the network information that client-side program transmits, analyzed
And extract identifier, searched for based on identifier after determining relative users login account information, be classified as in blacklist it is stolen or
The equipment of loss is compared judgement, if comparative result is consistent, can be identified as equipment that is stolen or losing.
User account information modification is arranged to lose or be stolen equipment by central server, and is sent a notification message and returned
Back to client-side program.After client-side program receives corresponding notification message, it is possible to find the computer is now by central service
Device is defined as losing or being stolen equipment, starts to gather the positioning of the notebook computer and tracked information, such as:The machine MAC, detection
Time, the machine Ip addresses, gateway address, external proxy server address and ethernet router, wireless access point coordinate information,
Central server is sent to, is handled by central server and is stored, location tracking is carried out to target device.
Prior art is not formatted simply in memory, and program is not unloaded, delete or operating system does not have
In the case of by refitting, the equipment can be just navigated to, and the system proposed by the present invention for being used to position notebook is with different sides
Method is run.Even if the stolen notebook computer either lost is deleted or unloaded even operating system quilt in client-side program
Refitting can also navigate to the notebook computer lost or be stolen in the case of either formatting.
In extreme circumstances, equipment is stolen, and operating system is reset, when machine is restarted, in BIOS
Drive load program starts first, and detection client deployment program whether there is, it is found that client-side program is lost, then discharge client
Program is held to specified location.Transfer to operating system client-side program.After os starting, visitor is found that in specified location
After the program of family end, client-side program is run.Client-side program still is able to the information of the equipment of collection to be sent to central service
Device processing.
The lost devices or all information of stolen equipment being collected into by client-side program may serve to positioning should
Device location.Lose or the external address of stolen notebook can by webserver provider (NSP) come
Determine the determination position of external address.External address tracks loss by NSP routing tables or stolen equipment finally route ground
Location, it is determined that loss or stolen notebook computer final outlet address.By NSP data, services, then pass through the machine Ip addresses essence
Really to loss or the particular location of stolen notebook computer.By user's enrollment status information, it is determined that loss or stolen pen
Remember the home subscriber of this computer.
It can be subject in addition by way of (GPS) satellite positioning module that client-side program activates notebook computer connection
Spotting.If the notebook computer does not have satellite navigation module, its position can be still determined by other means, only
It is error in precision be present.For example, loss or stolen notebook computer wirelessly have been started up, then can passes through its week
The position for enclosing more than at least three hotspot is determined.Then central server is using collected by client-side program
Ethernet router, accessing wirelessly point coordinates determines to be connected to the position of belonging network equipment.In the case, lose or
Person is stolen the position of notebook computer it was determined that still precision is less than the coordinate determined by GPS navigation system, and its precision can be high
In the geographical position followed the trail of by external address bit.
In order to intuitively position the address location of loss or stolen equipment, provide in central server and shown by map
Show that output location tracking is stolen or loses notebook computer position, central server is collected into loss or stolen device coordinate
After information, just carry out after corresponding Coordinate Conversion is sent to map server, after map server receives corresponding coordinate, finally
The position of the notebook computer is marked by conspicuous color according to the coordinate of loss or stolen notebook computer.
Claims (8)
1. a kind of method for location tracking portable terminal, this method includes:
Step 1, client bootstrap is deployed in the BIOS of portable terminal, client bootstrap includes driver
And client-side program;In step 1, above-mentioned driver is used for analysis operation system file structure and fdisk structure, fixed
The index of position fdisk read-write part, is written and read to hard disk NTFS subregion, will be used by UEFIBIOS DriverModel
It is installed in the read-write capability of NTFS partition in UEFIBIOS SimpleFileSystemProtocol to realize;Above-mentioned client
It is that T programs Trigon.Exe is converted into binary file to hold program, is compiled into BIOS, as one in BIOS module
Submodule is present in bios program with binary code;
Step 2, when BIOS starts, client-side program is stored in hard disk by driver;
Step 3, os starting, if corresponding client-side program in hard disk be present, client-side program and center are started
Server establishes communication;
Step 4, the device identifier of portable terminal is sent to central server by client-side program, and central server is discriminated
The state of other portable terminal, and notify client-side program;
Step 5, after central server receives the device identifier sent by client-side program, by centralized management backstage to portable
Terminal is positioned and followed the trail of.
2. it is used for the method for location tracking portable terminal as claimed in claim 1, it is characterised in that
Step 2 further comprises,
When step 2-1, starting up BIOS, start the driver in client bootstrap to operating system partition and text
Part system is analyzed, and obtains the off-position of client-side program in a hard disk;
Step 2-2, driver deposit client-side program off-position in a hard disk.
3. it is used for the method for location tracking portable terminal as claimed in claim 2, it is characterised in that
In step 2-1, above-mentioned driver is it is first determined whether be hard disk, if not analyzing subregion further then
Form;If hard disk, then need to judge whether zoned format is NTFS format, if it is further position and discharge client
Program, if not driver is then exited, carries out os starting to specified location;It is right when analyzing zoned format
The structure of subregion is parsed, and the standard interface function provided by driver realizes the read-write to NTFS partition, realization pair
The positioning of specific specific file path, and obtain other information;Hard disc data is analyzed by ad hoc rules, navigates to file position
Put index, it may be determined that file original position and the offset of section in a hard disk, client journey is calculated and determined according to offset
Sequence off-position.
4. it is used for the method for location tracking portable terminal as claimed in claim 2, it is characterised in that
In step 2-2, above-mentioned driver is gone after SimpleFileSystemProtocol installations by this agreement
The program code of reading client program off-position;If the state returned when reading is EFI_NOT_FOUND, do not find
The file under NTFS partition path is specified, then illustrates do not have client-side program under specified path, driver reads and is stored in
Client-side program binary code in BIOS, according to the client-side program off-position of determination, pass through
Client-side program binary code in BIOS is written to the release position of determination by SimpleFileSystemProtocol agreements
Put.
5. it is used for the method for location tracking portable terminal as claimed in claim 4, it is characterised in that
Step 2-2 further comprises, also to judge to read the shape of client-side program under specified path in next start process
State;If the state read is EFI_FOUND, proves that client-side program has been present, zoned format can be verified by MD5
On existing client-side program it is whether consistent with the binary code to be write, if the result is consistent, be not required to again
Separately write, if the result is inconsistent, show the client-side program or destroyed on zoned format, or changed, then need
Re-write.
6. it is used for the method for location tracking portable terminal as claimed in claim 1, it is characterised in that
In step 4, client-side program immediately enters operation, obtains portable terminal unique identifier first, submits to center
Server, central server receive the network information that client-side program transmits, and are analyzed and extract identifier, based on identifier
After search determines relative users login account information, compared with portable terminal that is stolen or losing is classified as in blacklist
Judge, if comparative result is consistent, can be identified as portable terminal that is stolen or losing, this is sent just to client-side program
Whether the formula terminal of taking is stolen or the notification message of loss.
7. it is used for the method for location tracking portable terminal as claimed in claim 1, it is characterised in that
Further comprise in steps of 5,
Client-side program receives central server notice, if it is confirmed that portable terminal is lost or is stolen, then starting collection should
The positioning of portable terminal and tracked information, including the machine MAC, detection time, local IP address, gateway ip address, outside generation
Server ip address and ethernet router, wireless access point coordinate information are managed, central server is sent to, by central server
Handled and stored, location tracking is carried out to target portable terminal.
8. it is used for the method for location tracking portable terminal as claimed in claim 1, it is characterised in that
Step 5 further comprises, central server carries out location tracking to target portable terminal, can use it is following a kind of or
Various ways:
(a) the determination position of external address is determined by webserver provider, external address is followed the trail of by NSP routing tables
To losing or the last routing address of stolen portable terminal, it is determined that losing or stolen portable terminal final outlet
Location;Data, services are provided by NSP, then the specific position of loss or stolen portable terminal is accurate to by local IP address
Put;
(b) it is subject to spotting by way of the satellite positioning module that client-side program activates portable terminal connection;
(c) determined by the position of more than at least three hotspot around portable terminal, central server utilizes
Ethernet router collected by client-side program, accessing wirelessly point coordinates determine to be connected to the position of belonging network equipment,
And then determine the position of loss or stolen portable terminal.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510096050.9A CN104901941B (en) | 2015-03-04 | 2015-03-04 | A kind of system and method based on notebook location tracking under BIOS |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510096050.9A CN104901941B (en) | 2015-03-04 | 2015-03-04 | A kind of system and method based on notebook location tracking under BIOS |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104901941A CN104901941A (en) | 2015-09-09 |
CN104901941B true CN104901941B (en) | 2018-04-06 |
Family
ID=54034339
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510096050.9A Expired - Fee Related CN104901941B (en) | 2015-03-04 | 2015-03-04 | A kind of system and method based on notebook location tracking under BIOS |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104901941B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106878666B (en) * | 2015-12-10 | 2020-04-28 | 杭州海康威视数字技术股份有限公司 | Method, device and system for searching target object based on monitoring camera |
CN108388461A (en) * | 2018-02-27 | 2018-08-10 | 山东超越数控电子股份有限公司 | A kind of screen picture intercept method and device for firmware |
CN112308577A (en) * | 2020-11-06 | 2021-02-02 | 珠海格力电器股份有限公司 | Loss tracking method for network selling electric appliance |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101477603A (en) * | 2009-01-12 | 2009-07-08 | 杨俊生 | Computer security information card based on expanded BIOS technique and operation method thereof |
CN102880236A (en) * | 2012-08-16 | 2013-01-16 | 苏州启智机电技术有限公司 | Anti-theft computer mainboard |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7590837B2 (en) * | 2003-08-23 | 2009-09-15 | Softex Incorporated | Electronic device security and tracking system and method |
TW200943121A (en) * | 2008-04-15 | 2009-10-16 | Giga Byte Tech Co Ltd | A burglarproof method and system for portable computer devices |
CN103152439A (en) * | 2012-03-08 | 2013-06-12 | 林善红 | Internet protocol (IP) position searching, positioning and tracking method based on computer terminal equipment |
-
2015
- 2015-03-04 CN CN201510096050.9A patent/CN104901941B/en not_active Expired - Fee Related
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101477603A (en) * | 2009-01-12 | 2009-07-08 | 杨俊生 | Computer security information card based on expanded BIOS technique and operation method thereof |
CN102880236A (en) * | 2012-08-16 | 2013-01-16 | 苏州启智机电技术有限公司 | Anti-theft computer mainboard |
Non-Patent Citations (1)
Title |
---|
《不怕被盗 笔记本网络追踪应用》;飞鸟;《电脑知识与技术》;20090430;全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN104901941A (en) | 2015-09-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Barbera et al. | Signals from the crowd: uncovering social relationships through smartphone probes | |
EP3841730B1 (en) | Identifying device types based on behavior attributes | |
Li et al. | Multiple location profiling for users and relationships from social network and content | |
US20200112843A1 (en) | Method, Device and System For Creating A Virtual Local Social Network | |
CN101626398B (en) | Method for obtaining friend dynamic and system | |
US20020146002A1 (en) | Network administration apparatus, network administrating program, network administrating method and computer network system | |
WO2015117396A1 (en) | Wi-fi signal-based positioning method, device, and system | |
CN103607416B (en) | A kind of method and application system of the certification of network terminal machine identity | |
CN103052952A (en) | Apparatus and methods for managing content | |
CN103457837A (en) | Method and system for searching for instant messages through search engine | |
CN102685256B (en) | System and method for positioning lost electronic devices | |
CN106097468A (en) | One is registered method, terminal and IM application server | |
WO2009012705A1 (en) | Method for generating user attribute information and apparatus thereof | |
US11368901B2 (en) | Method for identifying a type of a wireless hotspot and a network device thereof | |
CN104601262B (en) | A kind of information processing method and mobile device | |
CN104901941B (en) | A kind of system and method based on notebook location tracking under BIOS | |
WO2018010693A1 (en) | Method and apparatus for identifying information from rogue base station | |
CN109948334A (en) | A kind of leak detection method, system and electronic equipment and storage medium | |
CN107197462A (en) | Detection method, device and the electronic equipment of wireless network type | |
WO2020168768A1 (en) | Mobile network access type identification | |
CN106302384A (en) | DNS message processing method and device | |
CN113572752A (en) | Abnormal flow detection method and device, electronic equipment and storage medium | |
CN101980504B (en) | Data sharing method, mobile terminal and server | |
CN102739446B (en) | The method and apparatus for selecting Network Time Protocol server | |
CN106535117A (en) | Electronic device remote positioning method and apparatus |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20180406 Termination date: 20200304 |