CN105825157A - Mobile memory with tracking function and tracking and finding method - Google Patents

Mobile memory with tracking function and tracking and finding method Download PDF

Info

Publication number
CN105825157A
CN105825157A CN201610322970.2A CN201610322970A CN105825157A CN 105825157 A CN105825157 A CN 105825157A CN 201610322970 A CN201610322970 A CN 201610322970A CN 105825157 A CN105825157 A CN 105825157A
Authority
CN
China
Prior art keywords
mobile memory
information
mobile
former owner
memory
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610322970.2A
Other languages
Chinese (zh)
Other versions
CN105825157B (en
Inventor
崔永波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xi'an Morebeck Semiconductor Technology Co Ltd
Original Assignee
Xi'an Morebeck Semiconductor Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xi'an Morebeck Semiconductor Technology Co Ltd filed Critical Xi'an Morebeck Semiconductor Technology Co Ltd
Priority to CN201610322970.2A priority Critical patent/CN105825157B/en
Publication of CN105825157A publication Critical patent/CN105825157A/en
Application granted granted Critical
Publication of CN105825157B publication Critical patent/CN105825157B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/88Detecting or preventing theft or loss

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

The invention discloses a mobile memory with a tracking function. The mobile memory comprises a system reserve area, a verification module, a positioning module and a communication module. The invention further discloses a method for tracking and finding the mobile memory after the mobile memory is lost or stolen. The mobile memory and the tracking and finding method have the following advantages that after the mobile memory is lost or stolen, the mobile memory can be tracked and found no matter a connecting terminal of the mobile memory is networked or not and even the lost or stolen mobile memory is not used by the connecting terminal, and the lost or stolen mobile memory is high in confidentiality and difficult to break.

Description

A kind of mobile memory with tracking function and tracking method for retrieving
Technical field
The present invention relates to a kind of mobile memory and method, a kind of traceable method given for change after losing particularly to mobile memory with tracking function and mobile memory or be stolen.
Background technology
Along with development and the progress of mobile memory of electronics technology, high-capacity and high-speed mobile memory because of its at a high speed, the advantage that reliable, frivolous, noise is little, become electronic product main flow.
The volume of mobile memory is little, has and loses and the generation of stolen situation.Application number 201010247029.1 patent name discloses a kind of traceable flash memory device, system and method for tracing for " traceable flash memory device, system and method for tracing ", by losing judging unit, detect identity continuous comparison errors number more than error thresholds, judge that the state of flash memory device is as losing, providing the probability cracking identity information virtually to illegal owner, confidentiality is the highest;After judging that the state of flash memory device is as losing, the electronic equipment needing flash memory device to connect is in networking state, the position of flash memory device is confirmed by the network interface card serial number of tracking electronic equipment, IP address and default gateway, the specifically used physical location of this equipment can not be positioned, the precision followed the trail of and poor in timeliness, helpless for non-networked situation.
Summary of the invention
For the defect overcoming above-mentioned prior art to exist, the present invention provides a kind of mobile memory with tracking function and follows the trail of method for retrieving, and this invention has the advantages that
After mobile memory is lost or be stolen, the connection terminal of mobile memory is regardless of whether networking, and mobile memory can be tracked and give for change;Even if even this loss or stolen mobile memory are not connected terminal and use, it is also possible to tracked give for change;And this loss or stolen mobile memory confidentiality are high, it is not easy to be cracked.
For achieving the above object, the present invention provides following technical scheme:
The invention discloses a kind of mobile memory with tracking function, including system trough, correction verification module, locating module, communication module;
Described system trough, the inside write pairing verification file, when described mobile memory is connected terminal by former owner for the first time, mobile memory is initialized, then the first information connecting terminal is read, generate unique check key and white list according to the first information connecting terminal, and the information binding former owner receives address;
Described correction verification module, detecting inserts the information of terminal and compares with white list, and information is not mated, startup locating module and communication module;
Described locating module, it is possible to disengaging wireless Internet and wired internet determine the physical location of described mobile memory;
Described communication module, the physical location information of the mobile memory detected by described locating module and end message are sent to the information of former owner and receive address.
Preferably, locating module is GPS or the Big Dipper.
Preferably, described communication module, connect including WIFI, support CDMA, EDGE, GPRS network type, and by Ministry of Industry and Information's networking license.
Preferably, being used for mobile memory is carried out initialized first connection terminal is computer, smart mobile phone or other terminal with MAC Address.
Preferably, the information of described first connection terminal includes MAC Address, IP address, computer gateway information, DNS.
Preferably, the information reception address of described former owner includes phone number, E-mail address, wechat number, QQ number.
Preferably, described white list can be added by following steps:
1) mobile memory connects terminal;
2) starting correction verification module, information and the white list of detecting connection terminal verify, if verifying unsuccessfully, forward step 3 to;
3) starting locating module and communication module, locating module confirms the physical location of mobile memory, and communication module sends information and the physical location information of mobile memory of terminal to former owner;
4) this user is authorized by former owner, can reply fixed character by SMS, or be opened be linked into confirming by E-mail address, QQ, wechat, and after mandate, white list can add this end message.
Preferably, described white list is modified by former owner by computer client or mobile phone A PP:
1) former owner downloads computer client or mobile phone A PP of mobile memory;
2) former owner inputs unique key and enters mobile phone A PP or computer client;
3) revise in white list after former owner enters mobile phone A PP or computer client.
Preferably, mobile memory also includes integrated power, including can charge-discharge battery, when connecting with terminal, can charge-discharge battery charging;When extracting mobile memory, integrated power is locating module and communication module is powered.
Preferably, former owner arranges timing feedback, every timing feedback time point in the system trough of mobile memory, sends the physical location information of mobile memory to owner.
Have and follow the trail of the mobile memory of retrieval function integrated power and insert power interface when starting to power, all can open locating module and and communication module, the information bound to former owner receives address feedback mobile memory physical location information.
The invention also discloses the tracking method for retrieving of a kind of mobile memory, for having after the mobile memory of tracking function is lost or be stolen, its tracking given for change, comprise the following steps:
(1) mobile memory connects terminal
(2) starting correction verification module, detecting is inserted the information of terminal and is compared with white list, and information is not mated, and forwards step (3) to;
(3) communication module and locating module are started: locating module detecting physical location information, communication module is by mobile memory physical location information, the MAC Address of terminal, IP address field are sent to the information of former owner and receive address, twice verification all generates text entry and is stored in system trough, the most for future reference sees.
(4) mobile memory is given in tracking for change: former owner receives, according to information, the physical location information of mobile memory, the information of terminal that address obtains, and follows the trail of and gives mobile memory for change.
The invention also discloses a kind of mobile memory and follow the trail of method for retrieving by computer client or mobile phone A PP, comprise the following steps:
(1) former owner downloads mobile memory computer client or mobile phone A PP;
(2) former owner enters mobile memory computer client or mobile phone A PP by unique verification password;
(3) former owner obtains the physical location of mobile memory by computer client or mobile phone A PP;
(4) judge whether mobile memory is lost according to the physical location of mobile memory, if so, proceed to step (5);
(5) mobile memory is given in tracking for change, gives for change according to the positional information of mobile memory in computer client or mobile phone A PP.
The invention also discloses a kind of mobile memory and follow the trail of method for retrieving by timing feedback, for having after the mobile memory of tracking function is lost or be stolen, its tracking is given for change, comprise the following steps:
(1) timing feedback time point has been arrived;
(2) starting communication module and locating module, the physical location information of locating module detecting mobile memory, the physical location information of mobile memory is issued to the information of former owner and receives address by communication module;
(3) mobile memory is given in tracking for change: former owner receives the physical location information of the mobile memory that address obtains according to information, follows the trail of and gives mobile memory for change.
During mobile memory uses, former owner, according to personal use needs, both also can control to use region by limiting MAC Address by limiting IP section, and can be with computer client or mobile phone A PP management white list.
Accompanying drawing explanation
Fig. 1 is mobile memory structural representation;
Fig. 2 is the mobile memory structural representation of integrated power;
Fig. 3 is mobile memory initialization flowchart;
Fig. 4 a), 4b) be mobile memory white list modification process figure;
Fig. 5 is that mobile memory is by connecting the tracked method for retrieving of illegal terminal;
Fig. 6 is that mobile memory passes through computer client or the tracked method for retrieving of mobile phone A PP;
Fig. 7 is that mobile memory passes through the tracked method for retrieving of timing feedback;
Summary of the invention
Embodiment one
A kind of mobile memory 10 with tracking function, as it is shown in figure 1, include system trough 101, correction verification module 102, locating module 103, communication module 104;
System trough 101, when mobile memory 10 connects computer for the first time, mobile memory 10 is initialized, then the first information connecting computer is read, according to computer IP address, MAC Address, gateway information, DNS generate unique check key and white list, and bind the phone number of former owner, E-mail address, wechat number, QQ number;
Correction verification module 102, detecting is inserted the information of terminal and is verified with white list, verifies unsuccessful, starts locating module and communication module;
Locating module 103, is GPS or the Big Dipper, and disengaging wireless Internet and wired internet determine the physical location of mobile memory;
Communication module 104, the physical location information of the mobile memory 10 detected by locating module 103 and end message are sent to the information of former owner and receive address, communication module 104 is that WIFI connects, and supports CDMA, EDGE, GPRS network type, and by Ministry of Industry and Information's networking license;
Before former owner uses mobile memory 10 for the first time, need it is initialized, as it is shown on figure 3, the initialization flow process of mobile memory 10 is as follows:
Step 301, mobile memory 10 connect computer for the first time, mobile memory 10 and computer are attached,
Whether step 302, mobile memory 10 initialize, and as former owner selects no, then initialize flow process termination, select to be that mobile memory 10 is initialised, and forwards step 303 to such as former owner;
Step 303, the information reading first computer include MAC Address, IP address, gateway information, DNS,
Step 304, generate unique check key according to the information of first computer and produce white list,
Step 305, binding the reception address of former owner, the reception address of former owner includes phone number, E-mail address, wechat number, QQ number.
Mobile memory 10 is given other user when using by former owner, and other user can immediately be authorized by white list and use mobile memory 10, with reference to Fig. 4 a) shown in method as follows:
Step 401, mobile memory 10 connect computer, and after mobile memory 10 is accessed other computer by other user, computer is powered;
Step 402, startup correction verification module, verifying the information and white list that connect computer, if verifying unsuccessfully, forwarding step 403 to;
Step 403, startup locating module and communication module, mobile memory 10 sends the MAC Address of computer, IP address and the physical location of mobile memory 10 to former owner;
This user is authorized by step 404, former owner, mobile memory 10 is when the information of former owner's forwarding step 403, " whether this user being authorized " this option can be attached, if former owner is to this user mandate, fixed character can be replied by SMS, or open be linked into confirming by E-mail address, QQ, wechat, immediately complete to authorize, after mandate, white list adds the MAC Address of this computer, IP address
Step 405, mobile memory 10 normally use.
Wherein the verification principle of the correction verification module of step 402 is as follows:
1), when mobile memory is inserted into computer, is read by checking routine and be access in computerized information;
2) verification MAC Address, by with white list in record MAC Address comparison, if this MAC Address is not present in white list, carry out step 3).
3) verification IP address field, by contrasting with the IP address field in white list, if being present in white list, then success, mobile memory normally uses, if verifying unsuccessfully, then starts correction verification module failure.
If former owner or other user are accidentally lost or stolen during using mobile memory, when mobile memory is inserted computer use by illegal user, former owner can be tracked giving for change according to method as shown in Figure 5, comprise the following steps:
Step 501, mobile memory connect computer;
Step 502, startup correction verification module;
1), when mobile memory is inserted into computer, is read by checking routine and be access in computerized information;
2) verification MAC Address, by with white list in record MAC Address comparison, if this MAC Address is present in white list, then verify successfully, mobile memory normally uses.
3) if the MAC Address of computer is not present in white list, then verifying failure, verify IP address field after verifying unsuccessfully, contrast again by with the IP address field in white list, if being present in white list, then success, mobile memory normally uses.
Step 503, startup communication module and locating module: locating module detecting physical location information, communication module by the physical location information of mobile memory, connect the MAC Address of computer, IP address field and be sent to the information of former owner and receive address, twice verification all generates text entry and is stored in system trough, the most for future reference sees.
Step 504, tracking give mobile memory for change: former owner receives, according to information, mobile memory physical location information, the insertion MAC Address of computer, the IP address field that address obtains, and follows the trail of and gives mobile memory for change.
Embodiment two
A kind of mobile memory 20 following the trail of retrieval function integrated power, as in figure 2 it is shown, include communication module 201, locating module 202, system trough 203, correction verification module 204, integrated power 205;
Communication module 201, the physical location information of the mobile memory 20 detected by described locating module 202 and end message are sent to the information of former owner and receive address, communication module 201 is that WIFI connects, supports CDMA, EDGE, GPRS network type, and by Ministry of Industry and Information's networking license;
Locating module 202, is GPS or the Big Dipper, it is possible to disengaging wireless Internet and wired internet determine the physical location of mobile memory;
System trough 203, when mobile memory 20 connects smart mobile phone for the first time, mobile memory 20 is initialized, then the first information connecting smart mobile phone is read, according to smart mobile phone IP address, MAC Address, gateway information, DNS generate unique check key, and bind the phone number of former owner, E-mail address, wechat number, QQ number;
Correction verification module 204, detecting is inserted the information of terminal and is verified with white list, if verifying unsuccessful, starts locating module and communication module;
Integrated power 205, including can charge-discharge battery, when connecting with terminal, can charge-discharge battery charging;When extracting mobile memory, integrated power is locating module and communication module is powered.
Before former owner uses mobile memory 20 for the first time, need it is initialized, as it is shown on figure 3, the initialization flow process of mobile memory 20 is as follows:
Step 301, mobile memory 20 connect smart mobile phone for the first time, mobile memory 20 and smart mobile phone are attached,
Whether step 302, mobile memory 20 initialize, and as former owner selects no, then initialize flow process termination, select to be that mobile memory 20 is initialised, and forwards step 303 to such as former owner;
Step 303, reading the information of first smart mobile phone, it includes MAC Address, IP address, gateway information, DNS;
Step 304, according to first smart mobile phone information generate unique check key and produce white list;
Step 305, binding the reception address of former owner, the reception address of former owner includes phone number, E-mail address, wechat number, QQ number.
Mobile memory 20 is given other user when using by former owner, and other user can immediately be authorized by white list and use mobile memory 20, with reference to Fig. 4 a) shown in method as follows:
Step 401, mobile memory 20 connect smart mobile phone, after mobile memory 20 is accessed other smart mobile phone by other user;
Step 402, startup correction verification module 204, verifying the information and white list that connect smart mobile phone, if verifying unsuccessfully, forwarding step 403 to;
Step 403, startup locating module 202 and communication module 201, mobile memory 20 receives address to former owner's information and sends the MAC Address of smart mobile phone, IP address and the physical location of mobile memory 20;
This user is authorized by step 404, former owner, mobile memory 20 is when the information of former owner's forwarding step 403, " whether this user being authorized " this option can be attached, if former owner is to this user mandate, fixed character can be replied by SMS, or open be linked into confirming by E-mail address, QQ, wechat, immediately complete to authorize, after mandate, white list adds the MAC Address of this smart mobile phone, IP address
Step 405, mobile memory 20 normally use.
Wherein the verification principle of the correction verification module 204 of step 402 is as follows:
1), when mobile memory 20 is inserted into smart mobile phone, is read by checking routine and be access in smart mobile phone information;
2) verification MAC Address, by with white list in record MAC Address comparison, if this MAC Address is not present in white list, carry out step 3).
3) verification IP address field, by contrasting with the IP address field in white list, if being present in white list, then success, mobile memory normally uses, if verifying unsuccessfully, then starts correction verification module failure.
If former owner or other user are accidentally lost or stolen during using mobile memory 20, when mobile memory 20 is inserted smart mobile phone use by illegal user, former owner can be tracked giving for change according to method as shown in Figure 5, comprises the following steps:
Step 501, mobile memory 20 connect smart mobile phone;
Step 502, startup correction verification module 204;
Step 503, startup communication module 201 and locating module 202: locating module 202 detects physical location information, physical location information, MAC Address, IP address field are sent to the information of former owner and receive address by communication module 201, twice verification all generates text entry and is stored in system trough, the most for future reference sees.
Step 504, tracking give mobile memory 20 for change: former owner receives the physical location information of the mobile memory that address obtains according to information, inserts the MAC Address of smart mobile phone, IP address field, follows the trail of and gives mobile memory for change.
Embodiment three
A kind of mobile memory 20 of the integrated power with tracking function, as in figure 2 it is shown, include communication module 201, locating module 202, system trough 203, correction verification module 204, integrated power 205,
Communication module 201, the physical location information of the mobile memory 20 detected by locating module 202 and end message are sent to the information of former owner and receive address, communication module 201 is that WIFI connects, supports CDMA, EDGE, GPRS network type, and by Ministry of Industry and Information's networking license;
Locating module 202, including GPS or the Big Dipper, it is possible to disengaging wireless Internet and wired internet determine the physical location of mobile memory;
System reserves 203, when mobile memory 20 connects computer for the first time, mobile memory 20 is initialized, then the first information connecting computer is read, according to computer IP address, MAC Address, gateway information, DNS generate unique check key and produce white list, and bind the phone number of former owner, E-mail address, wechat number, QQ number;
Correction verification module 204, detecting is inserted the information of terminal and is verified with white list, if verifying unsuccessful, starts locating module and communication module;
Integrated power 205, including can charge-discharge battery, when connecting with terminal, can charge-discharge battery charging;When extracting mobile memory, power-supply system is locating module and communication module is powered.
Before former owner uses mobile memory 20 for the first time, need it is initialized, as it is shown on figure 3, the initialization flow process of mobile memory 20 is as follows:
Step 301, mobile memory 20 connect computer for the first time, mobile memory 20 and computer are attached,
Whether step 302, mobile memory 20 initialize, and as former owner selects no, then initialize flow process termination, select to be that mobile memory 20 is initialised, and forwards step 303 to such as former owner;
Step 303, the information of reading computer include MAC Address, IP address, gateway information, DNS,
Step 304, generate unique check key according to the computerized information of step 303 and produce white list,
Step 305, binding the reception address of former owner, the reception address of former owner includes phone number, E-mail address, wechat number, QQ number.
Step 306, arranging timing feedback time point, former owner can arrange the time of timing feedback in system trough, and to timing feedback time point, mobile memory 20 sends positional information to owner.
Mobile memory 20 is given other user when using by former owner, and other user can immediately be authorized by white list and use mobile memory 20, with reference to Fig. 4 a) shown in method as follows:
Step 401, mobile memory 20 connect computer, after mobile memory 20 is accessed other computer by other user;
Step 402, startup correction verification module 204, verifying the information and white list that connect computer, if verifying unsuccessfully, forwarding step 403 to;
Step 403, startup locating module 202 and communication module 201, mobile memory 20 sends the MAC Address of computer, IP address and the physical location of mobile memory 20 to former owner;
This user is authorized by step 404, former owner, mobile memory 20 is when the information of former owner's forwarding step 403, " whether this user being authorized " this option can be attached, if former owner is to this user mandate, fixed character can be replied by SMS, or open be linked into confirming by E-mail address, QQ, wechat, immediately complete to authorize, after mandate, white list adds the MAC Address of this computer, IP address
Step 405, mobile memory 20 normally use.
Wherein the verification principle of the correction verification module 204 of step 402 is as follows:
1), when mobile memory is inserted into computer, is read by checking routine and be access in computerized information;
2) verification MAC Address, by with white list in record MAC Address comparison, if this MAC Address is not present in white list, carry out step 3).
3) verification IP address field, by contrasting with the IP address field in white list, if being present in white list, then success, mobile memory normally uses, if verifying unsuccessfully, then starts correction verification module failure.
If former owner or other user are accidentally lost or stolen during using mobile memory, former owner can be tracked giving for change according to method as shown in Figure 6 by the function arranging timing feedback time point of mobile memory, comprises the following steps:
Step 601, arrive timing feedback time point;
Step 602, startup communication module 201 and locating module 202: locating module 202 detects the physical location information of mobile memory, the physical location information of mobile memory 20 is sent to the information of former owner and receives address by communication module 201;
Step 603, tracking mobile memory 20: former owner receives the physical location information of the mobile memory 20 that address obtains according to information, follows the trail of and gives mobile memory 20 for change.
Embodiment four
A kind of have the mobile memory 20 following the trail of retrieval function integrated power, as in figure 2 it is shown, include communication module 201, locating module 202, system trough 203, correction verification module 204, integrated power 205,
Communication module 201, the physical location information of the mobile memory 20 detected by locating module 202 and end message are sent to the information of former owner and receive address, communication module 201 is that WIFI connects, supports CDMA, EDGE, GPRS network type, and by Ministry of Industry and Information's networking license;
Locating module 202, is GPS or the Big Dipper, it is possible to disengaging wireless Internet and wired internet determine the physical location of mobile memory;
System trough 203, when mobile memory 20 connects the terminal with MAC Address for the first time, mobile memory 20 is initialized, then the information of the first terminal connecting and there is MAC Address is read, end message according to having MAC Address generates unique check key, and binds former owner's phone number, E-mail address, wechat number, QQ number, described in there is the end message of MAC Address include IP address, MAC Address, gateway information, DNS
Correction verification module 204, detecting is inserted the information of terminal and is verified with white list, if verifying unsuccessful, starts locating module and communication module;
Integrated power 205, including can charge-discharge battery, when connecting with terminal, can charge-discharge battery charging;When extracting mobile memory, power-supply system is locating module and communication module is powered.
Before former owner uses mobile memory 20 for the first time, need it is initialized, as it is shown on figure 3, the initialization flow process of mobile memory 20 is as follows:
Step 301, mobile memory 20 connect the terminal with MAC Address for the first time, mobile memory 20 and the terminal with MAC Address are attached,
Whether step 302, mobile memory 20 initialize, and as former owner selects no, then initialize flow process termination, select to be that mobile memory 20 is initialised, and forwards step 303 to such as former owner;
The information of the terminal that step 303, reading have MAC Address includes MAC Address, IP address, gateway information, DNS,
Step 304, according to step 303 have MAC Address end message generate unique check key and produce white list,
Step 305, binding the reception address of former owner, the reception address of former owner includes phone number, E-mail address, wechat number, QQ number.
Mobile memory 20 is given other user when using by former owner, and former owner directly authorizes other user by computer client or mobile phone A PP, with reference to Fig. 4 b) shown in method as follows:
Step 410, former owner download computer client or mobile phone A PP of mobile memory 20;
Step 411, former owner enter computer client or mobile phone A PP of mobile memory 20 by unique verification password;
Step 412, former owner add or deleting MAC address, IP address.
If former owner or other user are accidentally lost or stolen during using mobile memory 20, former owner can be followed the trail of by computer client or mobile phone A PP and give mobile memory 20 for change, comprises the following steps:
Step 701, former owner download mobile memory 20 computer client or mobile phone A PP;
Step 702, former owner enter computer client or mobile phone A PP of mobile memory 20 by unique verification password;
Step 703, former owner obtain the physical location of mobile memory 20 by computer client or mobile phone A PP;
Step 704, physical location according to mobile memory 20 judge whether mobile memory 20 is lost, and if so, proceed to step 705;
Mobile memory 20 is given in step 705, tracking for change, gives for change according to the positional information of mobile memory 20 in computer client or mobile phone A PP.
Above example is only the exemplary embodiment of the present invention; it is not used in the restriction present invention; those skilled in the art can be within the scope of the present invention, and the present invention makes various amendment or equivalent, and this amendment or equivalent also should be regarded as being within the scope of the present invention.

Claims (13)

1. a mobile memory with tracking function, it is characterised in that include system trough, correction verification module, locating module, communication module;
Described system trough, the inside write pairing verification file, when described mobile memory is connected terminal by former owner for the first time, mobile memory is initialized, then the first information connecting terminal is read, generate unique check key and white list according to the first information connecting terminal, and the information binding former owner receives address;
Described correction verification module, detecting inserts the information of terminal and compares with white list, and information is not mated, startup locating module and communication module;
Described locating module, departs from wired or unlimited the Internet, determines the physical location of mobile memory;
Described communication module, the physical location information of the mobile memory detected by described locating module and end message are sent to the information of former owner and receive address.
A kind of mobile memory with tracking function, it is characterised in that: locating module is GPS or the Big Dipper.
A kind of mobile memory with tracking function, it is characterised in that: described communication module, connect including WIFI, support CDMA, EDGE, GPRS network type, and by Ministry of Industry and Information's networking license.
A kind of mobile memory with tracking function, it is characterised in that: being used for mobile memory is carried out initialized first connection terminal is computer, smart mobile phone or the terminal with MAC Address.
A kind of mobile memory with tracking function, it is characterised in that: the information of described first connection terminal includes MAC Address, IP address, gateway information, DNS.
A kind of mobile memory with tracking function, it is characterised in that: the information of described former owner receives address and includes phone number, E-mail address, wechat number, QQ number.
A kind of mobile memory with tracking function, it is characterised in that: described white list can be added by following steps:
A) mobile memory connects terminal;
B) starting correction verification module, information and the white list of detecting connection terminal verify, if verifying unsuccessfully, forward step C to);
C) starting locating module and communication module, locating module confirms the physical location of mobile memory, and communication module sends information and the physical location information of mobile memory of terminal to former owner;
D) this user is authorized by former owner, can reply fixed character by SMS, or be opened be linked into confirming by E-mail address, QQ, wechat, and after mandate, white list can add this end message.
A kind of mobile memory with tracking function, it is characterised in that: former owner passes through computer client or mobile phone A PP, modifies described white list:
<1>former owner downloads computer client or mobile phone A PP of mobile memory;
<2>former owner inputs unique key and enters mobile phone A PP or computer client;
<3>revise in white list after former owner enters mobile phone A PP or computer client.
9. a kind of mobile memory with tracking function as described in claim 1 to 8, it is characterised in that: also include integrated power, described integrated power include can charge-discharge battery, when connecting with terminal, can charge-discharge battery charging;When extracting terminal, integrated power is locating module and communication module is powered.
A kind of mobile memory with tracking function, it is characterized in that: former owner arranges timing feedback in the system trough of mobile memory, every timing feedback time point, sends the physical location information of mobile memory to owner.
The tracking method for retrieving of 11. 1 kinds of mobile memories, uses the mobile memory described in claim 1 to 8, it is characterised in that comprise the following steps:
(1) mobile memory connects terminal;
(2) starting correction verification module, detecting is inserted the information of terminal and is compared with white list, and information is not mated, and forwards step (3) to;
(3) starting communication module and locating module: the physical location information of locating module detecting mobile memory, the information of the physical location information of mobile memory, terminal is sent to the information of former owner and receives address by communication module;
(4) follow the trail of and give mobile memory for change: former owner according to information receive mobile memory that address obtains physical location information, the information of terminal, follow the trail of and give mobile memory for change.
The tracking method for retrieving of 12. 1 kinds of mobile memories, uses the mobile memory described in claim 9, it is characterised in that comprise the following steps:
A () former owner downloads mobile memory computer client or mobile phone A PP;
B () former owner enters mobile memory computer client or mobile phone A PP by unique verification password;
C () former owner obtains the physical location of mobile memory by computer client or mobile phone A PP;
D according to the physical location of mobile memory, () judges whether mobile memory is lost, if so, proceed to step (e);
E () is followed the trail of and is given mobile memory for change, give for change according to the positional information of mobile memory in computer client or mobile phone A PP.
The tracking method for retrieving of 13. 1 kinds of mobile memories, uses the mobile memory described in claim 10, it is characterised in that comprise the following steps:
(A) timing feedback time point has been arrived;
(B) starting communication module and locating module, the physical location information of locating module detecting mobile memory, the physical location information of mobile memory is sent to the information of former owner and receives address by communication module;
(C) mobile memory is given in tracking for change: former owner receives the physical location information of the mobile memory that address obtains according to information, follows the trail of and gives mobile memory for change.
CN201610322970.2A 2016-05-16 2016-05-16 A kind of mobile memory and tracking method for retrieving with tracking function Active CN105825157B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610322970.2A CN105825157B (en) 2016-05-16 2016-05-16 A kind of mobile memory and tracking method for retrieving with tracking function

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610322970.2A CN105825157B (en) 2016-05-16 2016-05-16 A kind of mobile memory and tracking method for retrieving with tracking function

Publications (2)

Publication Number Publication Date
CN105825157A true CN105825157A (en) 2016-08-03
CN105825157B CN105825157B (en) 2018-12-07

Family

ID=56529602

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610322970.2A Active CN105825157B (en) 2016-05-16 2016-05-16 A kind of mobile memory and tracking method for retrieving with tracking function

Country Status (1)

Country Link
CN (1) CN105825157B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108600153A (en) * 2018-03-05 2018-09-28 北京小米移动软件有限公司 Verification method and device
CN109005183A (en) * 2018-08-15 2018-12-14 深圳市泰钦园贸易有限公司 A kind of information anti-lost method based on chip ID number and network/MAC address

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102930892A (en) * 2012-09-19 2013-02-13 无锡华御信息技术有限公司 Multifunctional safe U disk
CN104852948A (en) * 2014-02-14 2015-08-19 尚宏电子股份有限公司 Data access device and access method thereof
CN204695301U (en) * 2015-06-08 2015-10-07 湖南纽思曼存储科技有限公司 A kind of multi-functional encryption portable hard drive
CN105005722A (en) * 2015-06-26 2015-10-28 北京北信源软件股份有限公司 Access control method and apparatus for mobile storage device
CN204791973U (en) * 2015-04-17 2015-11-18 苏州市职业大学 Fingerprint lock USB flash disk

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102930892A (en) * 2012-09-19 2013-02-13 无锡华御信息技术有限公司 Multifunctional safe U disk
CN104852948A (en) * 2014-02-14 2015-08-19 尚宏电子股份有限公司 Data access device and access method thereof
CN204791973U (en) * 2015-04-17 2015-11-18 苏州市职业大学 Fingerprint lock USB flash disk
CN204695301U (en) * 2015-06-08 2015-10-07 湖南纽思曼存储科技有限公司 A kind of multi-functional encryption portable hard drive
CN105005722A (en) * 2015-06-26 2015-10-28 北京北信源软件股份有限公司 Access control method and apparatus for mobile storage device

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108600153A (en) * 2018-03-05 2018-09-28 北京小米移动软件有限公司 Verification method and device
CN109005183A (en) * 2018-08-15 2018-12-14 深圳市泰钦园贸易有限公司 A kind of information anti-lost method based on chip ID number and network/MAC address
CN109005183B (en) * 2018-08-15 2020-10-09 深圳市泰钦园贸易有限公司 Information anti-loss method based on chip ID number and network MAC address

Also Published As

Publication number Publication date
CN105825157B (en) 2018-12-07

Similar Documents

Publication Publication Date Title
CN102497635B (en) Server, terminal and account password acquisition method
JP5247124B2 (en) Authentication device, in-vehicle device, and authentication system
CN103188377B (en) A kind of anti-theft method for mobile terminal and theft preventing mobile terminal
JP4276411B2 (en) Communication device authentication system, communication device authentication method, communication device authentication apparatus, communication device authentication program, and information recording medium
CN111918243B (en) Digital vehicle key management method and device, vehicle and storage medium
CN104601324A (en) Verification method specific to applications, terminal and system
CN110406414A (en) Vehicular charging method, mobile terminal and server based on household charging pile
CN104901925A (en) End-user identity authentication method, device and system and terminal device
CN106293816B (en) A method of increasing the viscosity of the App of user and mobile intelligent terminal installation
CN104243155A (en) Safety verification method and device
CN108541324A (en) A kind of unlocking method of electronic lock device, client and its electronic lock device
CN103747013A (en) Cloud terminal login verification method and device
CN105992204A (en) Access authentication method of applications of mobile intelligent terminal and device
CN104767767A (en) Method, device and system for sharing Internet access data and network equipment
CN104702760A (en) Communication number updating method and device
CN105450629A (en) Biological-information-verification-based router connecting method and apparatus, and router
CN108809982B (en) Secret-free authentication method and system based on trusted execution environment
CN105657781A (en) Method and device for accessing WiFi network
CN104980899A (en) Communication method and system for mobile terminal, mobile terminal and server
CN112954647B (en) Vehicle Bluetooth key registration method and device, computer equipment and storage medium
CN105825157A (en) Mobile memory with tracking function and tracking and finding method
CN105007571A (en) Information processing method and service equipment
CN105227579A (en) Access rights method to set up and device
CN104753864A (en) Permission validation system and permission validation method
CN105574400A (en) Information processing method and electronic device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant