CN104901941B - A kind of system and method based on notebook location tracking under BIOS - Google Patents

A kind of system and method based on notebook location tracking under BIOS Download PDF

Info

Publication number
CN104901941B
CN104901941B CN201510096050.9A CN201510096050A CN104901941B CN 104901941 B CN104901941 B CN 104901941B CN 201510096050 A CN201510096050 A CN 201510096050A CN 104901941 B CN104901941 B CN 104901941B
Authority
CN
China
Prior art keywords
client
portable terminal
side program
bios
program
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201510096050.9A
Other languages
Chinese (zh)
Other versions
CN104901941A (en
Inventor
杨伟宁
田旭华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
XI'AN QINGTIAN SOFTWARE TECHNOLOGY Co Ltd
Original Assignee
XI'AN QINGTIAN SOFTWARE TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by XI'AN QINGTIAN SOFTWARE TECHNOLOGY Co Ltd filed Critical XI'AN QINGTIAN SOFTWARE TECHNOLOGY Co Ltd
Priority to CN201510096050.9A priority Critical patent/CN104901941B/en
Publication of CN104901941A publication Critical patent/CN104901941A/en
Application granted granted Critical
Publication of CN104901941B publication Critical patent/CN104901941B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

A kind of method for location tracking portable terminal,The present invention is to solve the location tracking integrity problem in existing burglary-resisting system,Client is guided into software deployment into the BIOS of portable terminal first,Client bootstrap includes driver and client-side program,When BIOS starts,Client-side program is stored in hard disk by driver,Os starting,If corresponding client-side program in hard disk be present,Then start client-side program to communicate with server foundation,The device identifier of portable terminal is sent to server by client-side program,Server is screened,And notify client-side program,After server receives the equipment message sent by client-side program,The lost devices are positioned and followed the trail of by centralized management backstage,Compared with existing burglary-resisting system,Hardware system is more succinct,Location data is more abundant,System reliability greatly improves.

Description

A kind of system and method based on notebook location tracking under BIOS
Technical field
The invention belongs to computer technology security fields, and in particular to a kind of ensuring computer security based on Internet Location tracking system and method.
Background technology
Constantly advanced now with science and technology, the electronic mobile device such as notebook computer has come into thousand ten thousand Family, increasing user are operated by using notebook computer, amusement, leisure and study.Possess big storage capability Notebook computer, such as photo, private privacy data, for company may be stored, it is also possible to store important business Business information.
Because notebook computer has small volume, the advantages that being easy to carry in light weight and it is deep had a preference for by user, but separately On the one hand also turn into the target that burglar steals and plundered, according to statistics, just there is within every 10 seconds a notebook computer to lose in the world.Surreptitiously The purpose of thief:The capsule information in computer are obtained, computer is sold off and seldom oneself uses.
The important information given stolen computer for change or given for change in stolen notebook has become society's problem of concern, and Computer network connects complicated variety, causes passively to search for stolen notebook computer by computer network more and more difficult.
Pass through the stolen pen for increasing specialised hardware equipment or being connected to using ageng come location tracking on internet Remember that this computerized information technology has been present, be all by the Internet transmission location information.
Above-mentioned technology has the defects of obvious, and under normal circumstances, above-mentioned technology can ensure the normal transmission of location information, but It is to be reset in operating system, low lattice, in the case that GHOST or hard disk are removed, can not almost finds the electricity of the loss Brain equipment.
The present invention is exactly to eliminate the deficiencies in the prior art by distinct methods, with it, in extreme circumstances, quilt Computer hard disc is stolen by refitting system, by low-level formatting and GHOST in the case that even hard disk is removed, this method still can be with In notebook computer in the case of networking, the position of the electronic equipment is searched.
The content of the invention
The invention aims to solve the location tracking integrity problem in existing burglary-resisting system, and then provide a kind of For the method for location tracking portable terminal, this method includes:
Step 1, client bootstrap is deployed in the BIOS of portable terminal, client bootstrap includes driving Program and client-side program;
Step 2, when BIOS starts, client-side program is stored in hard disk by driver;
Step 3, os starting, if corresponding client-side program in hard disk be present, start client-side program with Central server establishes communication;
Step 4, the device identifier of portable terminal is sent to central server by client-side program, and central server enters Row screens the state of portable terminal, and notifies client-side program;
Step 5, after central server receives the equipment message sent by client-side program, this is lost by centralized management backstage Equipment is lost to be positioned and followed the trail of.
A kind of system for location tracking portable terminal is also provided, the system includes:
Multiple portable terminals, central server, multiple portable terminals pass through network service with central server;
Client guiding module is solidified with the BIOS/firmware of portable terminal, including drive module and client mould Block;
Above-mentioned drive module is used to analyze the operating system partition of portable terminal and file system, obtains client The off-position of end module in a hard disk, read the client modules in BIOS and the off-position deposited in hard disk;
Above-mentioned client modules are used to after starting establish with central server to communicate, by the device identifier of portable terminal Central server is sent to, the notice of central server is received and sends equipment message;
Above-mentioned central server receives portable terminal identifier and carries out equipment examination, determines portable terminal lost condition And send and notify to client modules, after receiving the portable terminal message sent by client-side program, by centralized management backstage Processing equipment message is positioned and followed the trail of to the portable terminal.
The present invention has the following effects that compared with prior art:
The present invention is using program curing module into BIOS, it is not necessary to increases extra hardware, in operating system by form Change, or even in the case that hard disk is replaced, notebook is remained able to be positioned and tracked, and existing burglary-resisting system phase Than hardware system is more succinct, and location data is more abundant, and system reliability greatly improves.
Brief description of the drawings
Fig. 1 location tracking systems form schematic diagram;
Fig. 2 bios programs load flow chart;
Fig. 3 location tracking target device flow charts;
Embodiment
The following detailed description of the specific implementation of the present invention
Based on Fig. 1, the system for location tracking portable terminal includes:Multiple portable terminals, central server are more Individual portable terminal passes through network service with central server;The BIOS/firmware of portable terminal includes client guiding mould Block, client guiding module include drive module and client modules;Above-mentioned drive module is used for the operation to portable terminal System partitioning and file system are analyzed, and are obtained the off-position of client modules in a hard disk, are read the client in BIOS End module and the off-position deposited in hard disk;Above-mentioned client modules are used to after starting establish with central server to communicate, The device identifier of portable terminal is sent to central server, the feedback notification of central server is received and sends equipment and disappear Cease to central server;
Screened after above-mentioned central server receiving device identifier, and to client modules send notify, receive by After the equipment message that client-side program is sent, the lost devices are positioned and followed the trail of by centralized management backstage.
Based on Fig. 2,3, the procedure of detailed description location tracking portable terminal.
(1) first, the embedded client bootstrap in BIOS.
BIOS is the initialism of English " Basic Input Output System ", and literally rear Chinese is exactly " Basic input output system ".In fact, it is one group of program being cured in computer on mainboard on a rom chip, and it is preserved Self-check program and system self-starting journey after the programs of the most important basic input and output of computer, system set-up information, start Sequence.Its major function is to provide the bottom, most direct hardware setting and control for computer.BIOS is directly solderable at present In computer hardware, turn into inalienable part on computer main board.
BIOS is stored in ROM (Read Only Memory, read-only storage).Data inside ROM is in ROM In manufacturing process, it is programmed into factory with special method, content therein can only be read to change, once burning is entered Go, whether the data that user is able to validate only write-in is correct, it is impossible to changes again.If it find that data has any mistake, then Only give up and do not have to.
Based on this features of BIOS, client bootstrap forms whole as the one of submodules of BIOS Bios program module.It is written in the ROM of mainboard.And it is associated with computer self-test system self-triggered program.So as to avoid It is stolen or lose notebook in extreme circumstances:It is formatted, refitting system and GHOST cause client software to be broken It is bad, it can not position and follow the trail of the notebook information.
Client bootstrap is present in the BIOS in notebook computer, forms a set of program curing product, it is impossible to quilt Change and delete, because itself and notebook core position are integrally formed, and start before operating system.Fundamentally break away from pair The dependence of operating system, reach read-write capability of the control to operating system, so as to complete the deployment to client-side program.
Solidify embedded client bootstrap in BIOS and be largely divided into two parts, a part is to be used to control to operation The driver of system read-write function, available for analysis operation system file structure and fdisk structure, position fdisk The index of part is read and write, is ready for the deployment of client-side program.Above-mentioned driver can be used for entering hard disk NTFS subregion Row read-write, can be installed to UEFI BIOS's by UEFI BIOS Driver Model by the read-write capability for NTFS partition Realized in SimpleFileSystemProtocol.
Another part is exactly client-side program, and T programs Trigon.Exe is converted into binary file, is compiled into BIOS In, it is present in as a submodule in BIOS module with binary code in bios program.Above-mentioned driver can determine that The off-position of client-side program in a hard disk, the binary code of the client-side program solidified in BIOS is read, and with two The form of binary file is discharged into hard disk, and the binary code write in hard disk can be identified by operating system, and can be transported OK, terminal user can not carry out direct file operation to the binary code of write-in under an operating system, avoid user to hard The artificial of client-side program is deleted or modified in disk.In view of each manufacturer BIOS Size the problem of, T programs are compiled by c language Write complete, when being write, pass through second-compressed again, ensure that it has less binary code size, Yi Mianzao Into BIOS compilings but, there is mistake when or BIOS is run.
(2) when BIOS power-up starts, client bootstrap therein is started.
When BIOS power-up starts, the loading of driver in bootstrap, driver startup pair are triggered in some stage Operating system partition and the analysis of file system,
When carrying out zoned format judgement, above-mentioned driver is it is first determined whether be hard disk, if not then no longer entering One step analyzes zoned format;If hard disk, then need to judge whether zoned format is NTFS format, if it is further positioning With release client-side program to specified location, if not driver is then exited, os starting is carried out.In analysis subregion During form, the structure of subregion is parsed, the standard interface function provided by driver is realized to NTFS partition Read-write, the positioning to specific specific file path is realized, and obtain other information.Hard disc data is analyzed by ad hoc rules, Navigate to document location index, it may be determined that file original position and the offset of section in a hard disk, calculated simultaneously according to offset Determine client-side program off-position.
Driver goes to read known NTFS after SimpleFileSystemProtocol installations by this agreement The T programs of particular path (client-side program off-position determined by i.e.) in subregion;If the state returned when reading is EFI_NOT_FOUND, then without the file found under specified NTFS partition path, illustrate there is no T programs under specified path, drive Program reads the client-side program binary code being stored in BIOS, according to the client-side program off-position of determination, passes through T programs in BIOS are written to hard disk position (the i.e. client-side program specified by SimpleFileSystemProtocol agreements Off-position), T programs are stored in hard disk in the form of binary file, and this binary code can be known by operating system Not, and can run.
After T programs to be written to the hard disk position specified, start-up operation system stages can be entered;
For the power-on operation again of terminal, equally to judge to read T programs under specified path in next start process State;If the state read is EFI_FOUND, proves that T programs have been present, zoned format can be verified by MD5 On whether existing file and the file to be write consistent.If the result is consistent, it is not required to separately write again, if The result is inconsistent, shows the T programs or destroyed on zoned format, or is changed, then needs to re-write, so as to ensure T programs can correctly be run.
Illustrated by code below and hard disk information is obtained by agreement, position hard disk off-position, offset, then The program in BIOS is discharged to specified location, so as to complete the release work to hard disk program.
(3) after os starting, client-side program is run.
After os starting, the various configuration parameters of operating system are detected, it is determined that there is client-side program in startup item In the presence of after, run client-side program, after client-side program startup optimization, obtain the identifier of notebook computer, and establish and in Entreat the network service of server.
The identifier of notebook computer can be obtained with a variety of methods.For common identifier, program verification can be used Code, the account of user, application program sequence number or specific password identify notebook computer.But the present invention is special due to it Surely the field used is related to computer security, and common identifier can not meet its requirement in specific environment identification equipment. The identifier that the present invention uses is hidden, is most difficult to eliminate or replaces.These identifiers include the network interface card of notebook computer Physical address (MAC Address), BIOS sequence numbers, the hardware configuration of hard disk serial number and computer.These parameters be it is most reliable, Even in hard disc of computer under conditions of formatting, it will not also lose.But in formatting procedure, operating system, application The data such as program, user account will lose.
Though several parameters cannot ensure 100% identification notebook more than.Because hard disk drive can be replaced. BIOS sequence numbers may can pass through special instrument in some situations without the even MAC Address of BIOS sequence numbers and machine Modify, so as to cause identifier to change.But statistics shows, only the user of only a few may take change, this Ensuring that can take symbol identified above to identify notebook computer.Identified identifier is exactly notebook computer in the present invention Physical network card address/MAC address as identification notebook computer unique identifier.
MAC (Medium/MediaAccess Control, medium access control) MAC Address is to be embodied in .MAC addresses inner NetworkInterfaceCard (network interface card, NIC), are also hardware address, are by 48 bits/bit length (6 words Section/byte, 1byte=8bits), the numeral composition of 16 systems.0-23 positions are called tissue unique identifier (organizationally unique), it is the mark for identifying LAN (LAN) node.24-47 positions are by producer oneself point With, wherein the 48th is multicast address flag bit.The physical address of network interface card is typically by the burned network interface card of network interface card manufacturer EPROM (a kind of flash chip, generally can be erasable by program), mark of really being rely when what it was stored is transmission data are sent The address of the computer of data and the main frame of reception data.
It is that main frame, Ran Houjin are identified by physical address that is, during the physical transfer of network bottom layer Row data transfer.It must be globally unique.For example Ethernet card, its physical address are the whole of 48bit (bit) Number, such as:44-45-53-54-00-00, it is stored in a manner of machine readable in HPI.Ethernet address management organization (IEEE:Institute of Electrical and Electric Engineers) by ethernet address, that is, the various combination of 48 bits, it is divided into some independent Continuation address group, the producer for producing ethernet nic just buys one of which, when specifically producing, one by one by unique address assign with Too network interface card.MAC as notebook unique identifier is the pith of user account information, is that notebook is lost in positioning search Key point.With the popularization of the electronic equipments such as notebook and wireless network, every notebook is owned by wireless and wired now Two kinds of physical network card addresses.For user when using notebook computer, it is impartial to open wired and wireless chance.I.e. same When, can open it is wireless or open it is wired can also open simultaneously it is wired and wireless two in physical network card.The present invention On the premise of guaranteeing to be accurately positioned and following the trail of the electronic equipment, unique identifier takes wireless and wired two kinds of physical network cards The combination of MAC Address.But for the MAC Address of mobile external NIC, there is unpredictalbe movement and replace possible in it Property, the unique identifier not using it as notebook computer.
(4) location tracking is carried out using client-side program.
The framework mode of location tracking system is based on client and central server pattern in the present invention, and client-side program needs To be coordinated and be managed by central server.New task is assigned by the information for collecting and analyzing the client transmitted. T programs are run under operating system, because T programs need the support of network linking, and because of the otherness of each system, in power-on operation After system starts, now T programs are had been written under the path for the NTFS partition form specified, it is necessary to which T programs do timing inspection Survey after determining network linking success and run.
When user runs client-side program for the first time, it is necessary to which registered user's account, fills in user's basic condition, correspondent party The relevant informations such as formula, addresses of items of mail are simultaneously submitted to central server using the identifier of the electronic equipment as unique mark.So The notebook computer unique identifier is just bundled into together with the relevant information of user, is registered in central server.The user Information is mutually bundled with equipment so that computer is closely connected with its user account.Use can be related to by the information of the registration Family.
For having registered user, when user has found that corresponding notebook computer has been stolen or lost in account When, it can be sent to central server and notify the equipment to be stolen.Central server the equipment is stored in immediately it is stolen or Person loses blacklist, starts function of search.
After network linking success, client-side program enters operation, obtains notebook computer unique identifier first, Such as:After the machine MAC, central server is submitted to, central server receives the network information that client-side program transmits, analyzed And extract identifier, searched for based on identifier after determining relative users login account information, be classified as in blacklist it is stolen or The equipment of loss is compared judgement, if comparative result is consistent, can be identified as equipment that is stolen or losing.
User account information modification is arranged to lose or be stolen equipment by central server, and is sent a notification message and returned Back to client-side program.After client-side program receives corresponding notification message, it is possible to find the computer is now by central service Device is defined as losing or being stolen equipment, starts to gather the positioning of the notebook computer and tracked information, such as:The machine MAC, detection Time, the machine Ip addresses, gateway address, external proxy server address and ethernet router, wireless access point coordinate information, Central server is sent to, is handled by central server and is stored, location tracking is carried out to target device.
Prior art is not formatted simply in memory, and program is not unloaded, delete or operating system does not have In the case of by refitting, the equipment can be just navigated to, and the system proposed by the present invention for being used to position notebook is with different sides Method is run.Even if the stolen notebook computer either lost is deleted or unloaded even operating system quilt in client-side program Refitting can also navigate to the notebook computer lost or be stolen in the case of either formatting.
In extreme circumstances, equipment is stolen, and operating system is reset, when machine is restarted, in BIOS Drive load program starts first, and detection client deployment program whether there is, it is found that client-side program is lost, then discharge client Program is held to specified location.Transfer to operating system client-side program.After os starting, visitor is found that in specified location After the program of family end, client-side program is run.Client-side program still is able to the information of the equipment of collection to be sent to central service Device processing.
The lost devices or all information of stolen equipment being collected into by client-side program may serve to positioning should Device location.Lose or the external address of stolen notebook can by webserver provider (NSP) come Determine the determination position of external address.External address tracks loss by NSP routing tables or stolen equipment finally route ground Location, it is determined that loss or stolen notebook computer final outlet address.By NSP data, services, then pass through the machine Ip addresses essence Really to loss or the particular location of stolen notebook computer.By user's enrollment status information, it is determined that loss or stolen pen Remember the home subscriber of this computer.
It can be subject in addition by way of (GPS) satellite positioning module that client-side program activates notebook computer connection Spotting.If the notebook computer does not have satellite navigation module, its position can be still determined by other means, only It is error in precision be present.For example, loss or stolen notebook computer wirelessly have been started up, then can passes through its week The position for enclosing more than at least three hotspot is determined.Then central server is using collected by client-side program Ethernet router, accessing wirelessly point coordinates determines to be connected to the position of belonging network equipment.In the case, lose or Person is stolen the position of notebook computer it was determined that still precision is less than the coordinate determined by GPS navigation system, and its precision can be high In the geographical position followed the trail of by external address bit.
In order to intuitively position the address location of loss or stolen equipment, provide in central server and shown by map Show that output location tracking is stolen or loses notebook computer position, central server is collected into loss or stolen device coordinate After information, just carry out after corresponding Coordinate Conversion is sent to map server, after map server receives corresponding coordinate, finally The position of the notebook computer is marked by conspicuous color according to the coordinate of loss or stolen notebook computer.

Claims (8)

1. a kind of method for location tracking portable terminal, this method includes:
Step 1, client bootstrap is deployed in the BIOS of portable terminal, client bootstrap includes driver And client-side program;In step 1, above-mentioned driver is used for analysis operation system file structure and fdisk structure, fixed The index of position fdisk read-write part, is written and read to hard disk NTFS subregion, will be used by UEFIBIOS DriverModel It is installed in the read-write capability of NTFS partition in UEFIBIOS SimpleFileSystemProtocol to realize;Above-mentioned client It is that T programs Trigon.Exe is converted into binary file to hold program, is compiled into BIOS, as one in BIOS module Submodule is present in bios program with binary code;
Step 2, when BIOS starts, client-side program is stored in hard disk by driver;
Step 3, os starting, if corresponding client-side program in hard disk be present, client-side program and center are started Server establishes communication;
Step 4, the device identifier of portable terminal is sent to central server by client-side program, and central server is discriminated The state of other portable terminal, and notify client-side program;
Step 5, after central server receives the device identifier sent by client-side program, by centralized management backstage to portable Terminal is positioned and followed the trail of.
2. it is used for the method for location tracking portable terminal as claimed in claim 1, it is characterised in that
Step 2 further comprises,
When step 2-1, starting up BIOS, start the driver in client bootstrap to operating system partition and text Part system is analyzed, and obtains the off-position of client-side program in a hard disk;
Step 2-2, driver deposit client-side program off-position in a hard disk.
3. it is used for the method for location tracking portable terminal as claimed in claim 2, it is characterised in that
In step 2-1, above-mentioned driver is it is first determined whether be hard disk, if not analyzing subregion further then Form;If hard disk, then need to judge whether zoned format is NTFS format, if it is further position and discharge client Program, if not driver is then exited, carries out os starting to specified location;It is right when analyzing zoned format The structure of subregion is parsed, and the standard interface function provided by driver realizes the read-write to NTFS partition, realization pair The positioning of specific specific file path, and obtain other information;Hard disc data is analyzed by ad hoc rules, navigates to file position Put index, it may be determined that file original position and the offset of section in a hard disk, client journey is calculated and determined according to offset Sequence off-position.
4. it is used for the method for location tracking portable terminal as claimed in claim 2, it is characterised in that
In step 2-2, above-mentioned driver is gone after SimpleFileSystemProtocol installations by this agreement The program code of reading client program off-position;If the state returned when reading is EFI_NOT_FOUND, do not find The file under NTFS partition path is specified, then illustrates do not have client-side program under specified path, driver reads and is stored in Client-side program binary code in BIOS, according to the client-side program off-position of determination, pass through Client-side program binary code in BIOS is written to the release position of determination by SimpleFileSystemProtocol agreements Put.
5. it is used for the method for location tracking portable terminal as claimed in claim 4, it is characterised in that
Step 2-2 further comprises, also to judge to read the shape of client-side program under specified path in next start process State;If the state read is EFI_FOUND, proves that client-side program has been present, zoned format can be verified by MD5 On existing client-side program it is whether consistent with the binary code to be write, if the result is consistent, be not required to again Separately write, if the result is inconsistent, show the client-side program or destroyed on zoned format, or changed, then need Re-write.
6. it is used for the method for location tracking portable terminal as claimed in claim 1, it is characterised in that
In step 4, client-side program immediately enters operation, obtains portable terminal unique identifier first, submits to center Server, central server receive the network information that client-side program transmits, and are analyzed and extract identifier, based on identifier After search determines relative users login account information, compared with portable terminal that is stolen or losing is classified as in blacklist Judge, if comparative result is consistent, can be identified as portable terminal that is stolen or losing, this is sent just to client-side program Whether the formula terminal of taking is stolen or the notification message of loss.
7. it is used for the method for location tracking portable terminal as claimed in claim 1, it is characterised in that
Further comprise in steps of 5,
Client-side program receives central server notice, if it is confirmed that portable terminal is lost or is stolen, then starting collection should The positioning of portable terminal and tracked information, including the machine MAC, detection time, local IP address, gateway ip address, outside generation Server ip address and ethernet router, wireless access point coordinate information are managed, central server is sent to, by central server Handled and stored, location tracking is carried out to target portable terminal.
8. it is used for the method for location tracking portable terminal as claimed in claim 1, it is characterised in that
Step 5 further comprises, central server carries out location tracking to target portable terminal, can use it is following a kind of or Various ways:
(a) the determination position of external address is determined by webserver provider, external address is followed the trail of by NSP routing tables To losing or the last routing address of stolen portable terminal, it is determined that losing or stolen portable terminal final outlet Location;Data, services are provided by NSP, then the specific position of loss or stolen portable terminal is accurate to by local IP address Put;
(b) it is subject to spotting by way of the satellite positioning module that client-side program activates portable terminal connection;
(c) determined by the position of more than at least three hotspot around portable terminal, central server utilizes Ethernet router collected by client-side program, accessing wirelessly point coordinates determine to be connected to the position of belonging network equipment, And then determine the position of loss or stolen portable terminal.
CN201510096050.9A 2015-03-04 2015-03-04 A kind of system and method based on notebook location tracking under BIOS Expired - Fee Related CN104901941B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510096050.9A CN104901941B (en) 2015-03-04 2015-03-04 A kind of system and method based on notebook location tracking under BIOS

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510096050.9A CN104901941B (en) 2015-03-04 2015-03-04 A kind of system and method based on notebook location tracking under BIOS

Publications (2)

Publication Number Publication Date
CN104901941A CN104901941A (en) 2015-09-09
CN104901941B true CN104901941B (en) 2018-04-06

Family

ID=54034339

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510096050.9A Expired - Fee Related CN104901941B (en) 2015-03-04 2015-03-04 A kind of system and method based on notebook location tracking under BIOS

Country Status (1)

Country Link
CN (1) CN104901941B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106878666B (en) * 2015-12-10 2020-04-28 杭州海康威视数字技术股份有限公司 Method, device and system for searching target object based on monitoring camera
CN108388461A (en) * 2018-02-27 2018-08-10 山东超越数控电子股份有限公司 A kind of screen picture intercept method and device for firmware
CN112308577A (en) * 2020-11-06 2021-02-02 珠海格力电器股份有限公司 Loss tracking method for network selling electric appliance

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101477603A (en) * 2009-01-12 2009-07-08 杨俊生 Computer security information card based on expanded BIOS technique and operation method thereof
CN102880236A (en) * 2012-08-16 2013-01-16 苏州启智机电技术有限公司 Anti-theft computer mainboard

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7590837B2 (en) * 2003-08-23 2009-09-15 Softex Incorporated Electronic device security and tracking system and method
TW200943121A (en) * 2008-04-15 2009-10-16 Giga Byte Tech Co Ltd A burglarproof method and system for portable computer devices
CN103152439A (en) * 2012-03-08 2013-06-12 林善红 Internet protocol (IP) position searching, positioning and tracking method based on computer terminal equipment

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101477603A (en) * 2009-01-12 2009-07-08 杨俊生 Computer security information card based on expanded BIOS technique and operation method thereof
CN102880236A (en) * 2012-08-16 2013-01-16 苏州启智机电技术有限公司 Anti-theft computer mainboard

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
《不怕被盗 笔记本网络追踪应用》;飞鸟;《电脑知识与技术》;20090430;全文 *

Also Published As

Publication number Publication date
CN104901941A (en) 2015-09-09

Similar Documents

Publication Publication Date Title
Barbera et al. Signals from the crowd: uncovering social relationships through smartphone probes
EP3841730B1 (en) Identifying device types based on behavior attributes
Li et al. Multiple location profiling for users and relationships from social network and content
US20200112843A1 (en) Method, Device and System For Creating A Virtual Local Social Network
CN101626398B (en) Method for obtaining friend dynamic and system
US20020146002A1 (en) Network administration apparatus, network administrating program, network administrating method and computer network system
WO2015117396A1 (en) Wi-fi signal-based positioning method, device, and system
CN103607416B (en) A kind of method and application system of the certification of network terminal machine identity
CN103052952A (en) Apparatus and methods for managing content
CN103457837A (en) Method and system for searching for instant messages through search engine
CN102685256B (en) System and method for positioning lost electronic devices
CN106097468A (en) One is registered method, terminal and IM application server
WO2009012705A1 (en) Method for generating user attribute information and apparatus thereof
US11368901B2 (en) Method for identifying a type of a wireless hotspot and a network device thereof
CN104601262B (en) A kind of information processing method and mobile device
CN104901941B (en) A kind of system and method based on notebook location tracking under BIOS
WO2018010693A1 (en) Method and apparatus for identifying information from rogue base station
CN109948334A (en) A kind of leak detection method, system and electronic equipment and storage medium
CN107197462A (en) Detection method, device and the electronic equipment of wireless network type
WO2020168768A1 (en) Mobile network access type identification
CN106302384A (en) DNS message processing method and device
CN113572752A (en) Abnormal flow detection method and device, electronic equipment and storage medium
CN101980504B (en) Data sharing method, mobile terminal and server
CN102739446B (en) The method and apparatus for selecting Network Time Protocol server
CN106535117A (en) Electronic device remote positioning method and apparatus

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20180406

Termination date: 20200304