CN105825157B - A kind of mobile memory and tracking method for retrieving with tracking function - Google Patents

A kind of mobile memory and tracking method for retrieving with tracking function Download PDF

Info

Publication number
CN105825157B
CN105825157B CN201610322970.2A CN201610322970A CN105825157B CN 105825157 B CN105825157 B CN 105825157B CN 201610322970 A CN201610322970 A CN 201610322970A CN 105825157 B CN105825157 B CN 105825157B
Authority
CN
China
Prior art keywords
mobile memory
information
former owner
address
mobile
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610322970.2A
Other languages
Chinese (zh)
Other versions
CN105825157A (en
Inventor
崔永波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xi'an Morebeck Semiconductor Technology Co Ltd
Original Assignee
Xi'an Morebeck Semiconductor Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xi'an Morebeck Semiconductor Technology Co Ltd filed Critical Xi'an Morebeck Semiconductor Technology Co Ltd
Priority to CN201610322970.2A priority Critical patent/CN105825157B/en
Publication of CN105825157A publication Critical patent/CN105825157A/en
Application granted granted Critical
Publication of CN105825157B publication Critical patent/CN105825157B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/88Detecting or preventing theft or loss

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

It include system trough, correction verification module, locating module, communication module the invention discloses a kind of mobile memory with tracking function;The method given for change is tracked the invention also discloses mobile memory loss or after being stolen, after the invention has the advantages that mobile memory is lost or is stolen, the connection terminal of mobile memory is regardless of whether networking, even if even the loss or stolen mobile memory be connected terminal carry out using, it can also be tracked and give for change, and the loss or stolen mobile memory confidentiality are high, it is not easy to be cracked.

Description

A kind of mobile memory and tracking method for retrieving with tracking function
Technical field
The present invention relates to a kind of mobile memory and method, in particular to a kind of mobile memory with tracking function with And mobile memory loses or the stolen rear traceable method given for change.
Background technique
With the development of electronics technology and the progress of mobile memory, high-capacity and high-speed mobile memory because its high speed, can It leans on, is frivolous, the advantage that noise is small, becoming electronic product mainstream.
The volume of mobile memory is little, has the situation lost and be stolen and occurs.Application number 201010247029.1 is special Sharp entitled " traceable flash memory device, system and method for tracing " disclose a kind of traceable flash memory device, System and method for tracing detect identity and continuously compare errors number greater than error thresholds, determine to move by losing judging unit The state of dynamic storage device is to lose, and virtually provides the probability for cracking identity information to illegal owner, confidentiality is not high; After judging the state of flash memory device to lose, the electronic equipment for needing flash memory device to connect is in connected state, leads to Network interface card sequence number, IP address and the default gateway of tracking electronic equipment are crossed to confirm the position of flash memory device, can not be determined The specifically used physical location of the position equipment, the precision and poor in timeliness of tracking are helpless for non-networked situation.
Summary of the invention
To overcome the problems of the above-mentioned prior art, the present invention provide a kind of mobile memory with tracking function and Method for retrieving is tracked, which has the advantages that
After mobile memory is lost or is stolen, the connection terminal of mobile memory is regardless of whether networking, mobile memory It can be tracked and give for change;Even if even the loss or stolen mobile memory be connected terminal carry out using, It can be tracked and give for change;And the loss or stolen mobile memory confidentiality are high, it is not easy to be cracked.
To achieve the above object, the invention provides the following technical scheme:
The invention discloses a kind of mobile memories with tracking function, including system trough, correction verification module, positioning Module, communication module;
The system trough, the inside write-in pairing verification file, for former owner by the mobile memory When first connection terminal, mobile memory is initialized, the information of first connection terminal is then read, according to first connection The information of terminal generates unique check key and white list, and the information for binding former owner receives address;
The information of the correction verification module, detecting insertion terminal is compared with white list, and information mismatches, starting positioning Module and communication module;
The locating module, can be detached from wireless Internet and wired internet determines the object of the mobile memory Manage position;
The communication module, physical location information and the terminal letter for the mobile memory that the locating module is detected The information that breath is sent to former owner receives address.
Preferably, locating module is GPS or Beidou.
Preferably, the communication module, including WIFI connection are supported CDMA, EDGE, GPRS network type, and are led to It crosses Ministry of Industry and Information and networks and permit.
Preferably, the first connection terminal for being initialized to mobile memory is computer, smart phone or tool There are other terminals of MAC Address.
Preferably, the information of the first connection terminal includes MAC Address, IP address, computer gateway information, DNS.
Preferably, it includes phone number, E-mail address, wechat number, QQ number that the information of the former owner, which receives address, Code.
Preferably, the white list can be added by following steps:
1) mobile memory connects terminal;
2) start correction verification module, the information and white list of detecting connection terminal are verified, if verification failure, goes to step 3;
3) start locating module and communication module, locating module confirms the physical location of mobile memory, communication module to Former owner sends the information of terminal and the physical location information of mobile memory;
4) former owner authorizes the user, can reply fixed character by SMS, or by E-mail address, QQ, wechat opening are linked into confirmation, and white list can add the end message after authorization.
Preferably, former owner modifies to the white list by computer client or cell phone application:
1) former owner downloads the computer client or cell phone application of mobile memory;
2) former owner's input unique key enters cell phone application or computer client;
3) former owner modifies in white list after entering cell phone application or computer client.
Preferably, mobile memory further includes integrated power, including can charge-discharge battery, when being connected with terminal, It can charge-discharge battery charging;When extracting mobile memory, integrated power is that locating module and communication module are powered.
Preferably, timing feedback, every timing feedback time is arranged in the system trough of mobile memory in former owner Point sends the physical location information of mobile memory to owner.
When mobile memory insertion power interface with tracking retrieval function integrated power starts power supply, can it hold It opens locating module and receives address with communication module, the information bound to former owner and feed back mobile memory physical bit confidence Breath.
The invention also discloses a kind of tracking method for retrieving of mobile memory, for the mobile storage with tracking function Device, which is lost or tracked after stolen it, to be given for change, comprising the following steps:
(1) mobile memory connects terminal
(2) start correction verification module, the information of detecting insertion terminal is compared with white list, and information mismatches, and goes to step Suddenly (3);
(3) start communication module and locating module: locating module detects physical location information, and communication module is stored mobile Device physical location information, the information that the MAC Address of terminal, IP address section are sent to former owner receive address, and verification is equal twice Text entry is generated to be stored in system trough, it is for future reference to see.
(4) mobile memory is given in tracking for change: former owner receives the physics for the mobile memory that address obtains according to information Mobile memory is given in the information of location information, terminal, tracking for change.
The invention also discloses a kind of mobile memories to track method for retrieving, packet by computer client or cell phone application Include following steps:
(1) former owner downloads mobile memory computer client or cell phone application;
(2) former owner enters mobile memory computer client or cell phone application by unique check password;
(3) former owner obtains the physical location of mobile memory by computer client or cell phone application;
(4) judge whether mobile memory is lost according to the physical location of mobile memory, if so, being transferred to step (5);
(5) mobile memory is given in tracking for change, according to the location information of mobile memory in computer client or cell phone application It gives for change.
The invention also discloses a kind of mobile memories to track method for retrieving by timing feedback, for having tracking function Mobile memory lose or it tracked after stolen and give for change, comprising the following steps:
(1) timing feedback time point has been arrived;
(2) start communication module and locating module, locating module detects the physical location information of mobile memory, communicates mould The information that the physical location information of mobile memory is issued to former owner is received address by block;
(3) mobile memory is given in tracking for change: former owner receives the physics for the mobile memory that address obtains according to information Mobile memory is given in location information, tracking for change.
During mobile memory use, former owner, both can be by limiting IP sections or leading to according to personal use needs Restriction MAC Address is crossed to control using area, and white list can be managed with computer client or cell phone application.
Detailed description of the invention
Fig. 1 is mobile memory structural schematic diagram;
Fig. 2 is the mobile memory structural schematic diagram of integrated power;
Fig. 3 is mobile memory initialization flowchart;
Fig. 4 a), 4b) be mobile memory white list modification process figure;
Fig. 5, which is mobile memory, is tracked method for retrieving by connecting illegal terminal;
Fig. 6 is that mobile memory by computer client or cell phone application is tracked method for retrieving;
Fig. 7 is that mobile memory by timing feedback is tracked method for retrieving;
Specific embodiment
Embodiment one
A kind of mobile memory 10 with tracking function, as shown in Figure 1, including system trough 101, correction verification module 102, locating module 103, communication module 104;
System trough 101 carries out initially mobile memory 10 when connecting computer for the first time for mobile memory 10 Change, then read the information of first connection computer, according to computer IP address, MAC Address, gateway information, DNS generate unique school Key and white list are tested, and binds the phone number, E-mail address, wechat number, QQ number code of former owner;
The information of correction verification module 102, detecting insertion terminal is verified with white list, verifies unsuccessful, starting positioning mould Block and communication module;
Locating module 103 is GPS or Beidou, is detached from wireless Internet and wired internet determines mobile memory Physical location;
Communication module 104, the physical location information and end message of the mobile memory 10 that locating module 103 is detected The information for being sent to former owner receives address, and communication module 104 is WIFI connection, supports CDMA, EDGE, GPRS network class Type, and networked and permitted by Ministry of Industry and Information;
It before former owner uses mobile memory 10 for the first time, needs to initialize it, as shown in figure 3, mobile storage The initialization process of device 10 is as follows:
Step 301, mobile memory 10 connect computer for the first time, and mobile memory 10 and computer are attached,
Whether step 302, mobile memory 10 initialize, and such as former owner's selection is no, then initialization process terminates, such as former Owner's selection is that mobile memory 10 is initialised, and goes to step 303;
Step 303, the information for reading first computer include MAC Address, IP address, gateway information, DNS,
Step 304 generates unique check key according to the information of first computer and generates white list,
Step 305, the reception address for binding former owner, the reception address of former owner includes phone number, electronics postal Case, wechat number, QQ number code.
Former owner gives mobile memory 10 to other users in use, other users can be by white list i.e. Shi Shouquan comes using mobile memory 10, and the method referring to shown in Fig. 4 a) is as follows:
Step 401, mobile memory 10 connect computer, after mobile memory 10 is accessed other computers by other users, Computer power supply;
Step 402, starting correction verification module, the information for connecting computer and white list are verified, if verification failure, goes to Step 403;
Step 403, starting locating module and communication module, mobile memory 10 send the MAC of computer to former owner Location, IP address and mobile memory 10 physical location;
Step 404, former owner authorize the user, information of the mobile memory 10 to former owner's sending step 403 When, can be attached to " whether authorizing to the user " this option can be returned if former owner authorizes the user by SMS Multiple fixed character, or confirmation is linked by E-mail address, QQ, wechat opening, authorization, after authorization, white name are completed immediately MAC Address, the IP address of the computer are singly added,
Step 405,10 normal use of mobile memory.
Wherein the verification principle of the correction verification module of step 402 is as follows:
1) it when mobile memory is inserted into computer, is read by checking routine by access computerized information;
2) MAC Address is verified, by comparing with the MAC Address recorded in white list, if the MAC Address is not present in white name Dan Zhong carries out step 3).
3) verify IP address section, by in white list IP address section compare, if it exists in white list, then succeed, Mobile memory normal use starts correction verification module failure if verification failure.
If former owner or other users are accidentally lost or are stolen during using mobile memory, make when illegally Mobile memory is inserted into computer to user in use, former owner can be tracked according to method as shown in Figure 5 and give for change, wraps Include following steps:
Step 501, mobile memory connect computer;
Step 502, starting correction verification module;
1) it when mobile memory is inserted into computer, is read by checking routine by access computerized information;
2) MAC Address is verified, by comparing with the MAC Address recorded in white list, if the MAC Address is present in white list In, then verify success, mobile memory normal use.
If 3) MAC Address of computer is not present in white list, failure is verified, verifies IP address section after verification failure, Same pass through compares with the IP address section in white list, if it exists in white list, then succeeds, mobile memory normal use.
Step 503, starting communication module and locating module: locating module detects physical location information, and communication module will move The information that the physical location information of dynamic memory, the MAC Address for connecting computer, IP address section are sent to former owner receives ground Location verifies generation text entry twice and is stored in system trough, for future reference to see.
Mobile memory is given in step 504, tracking for change: former owner receives the mobile memory object that address obtains according to information Location information, the MAC Address for being inserted into computer, IP address section are managed, mobile memory is given in tracking for change.
Embodiment two
It is a kind of track retrieval function integrated power mobile memory 20, as shown in Fig. 2, include communication module 201, Locating module 202, system trough 203, correction verification module 204, integrated power 205;
Communication module 201, the physical location information and terminal of the mobile memory 20 that the locating module 202 is detected The information that information is sent to former owner receives address, and communication module 201 is WIFI connection, supports CDMA, EDGE, GPRS network Type, and networked and permitted by Ministry of Industry and Information;
Locating module 202 is GPS or Beidou, can be detached from wireless Internet and wired internet determines mobile storage The physical location of device;
System trough 203 carries out just mobile memory 20 when connecting smart phone for the first time for mobile memory 20 Then beginningization reads the information of first connection smart phone, according to smart phone IP address, MAC Address, gateway information, DNS are raw At unique check key, and bind the phone number, E-mail address, wechat number, QQ number code of former owner;
The information of correction verification module 204, detecting insertion terminal is verified with white list, if verification is unsuccessful, starting positioning Module and communication module;
Integrated power 205, including can charge-discharge battery, when being connected with terminal, can charge-discharge battery charging;It extracts When mobile memory, integrated power is that locating module and communication module are powered.
It before former owner uses mobile memory 20 for the first time, needs to initialize it, as shown in figure 3, mobile storage The initialization process of device 20 is as follows:
Step 301, mobile memory 20 connect smart phone for the first time, and mobile memory 20 and smart phone are connected It connects,
Whether step 302, mobile memory 20 initialize, and such as former owner's selection is no, then initialization process terminates, such as former Owner's selection is that mobile memory 20 is initialised, and goes to step 303;
Step 303, the information for reading first smart phone comprising MAC Address, IP address, gateway information, DNS;
Step 304 generates unique check key according to first smart phone information and generates white list;
Step 305, the reception address for binding former owner, the reception address of former owner includes phone number, electronics postal Case, wechat number, QQ number code.
Former owner gives mobile memory 20 to other users in use, other users can be by white list i.e. Shi Shouquan comes using mobile memory 20, and the method referring to shown in Fig. 4 a) is as follows:
Step 401, mobile memory 20 connect smart phone, and mobile memory 20 is accessed other intelligence by other users After mobile phone;
Step 402, starting correction verification module 204, the information for connecting smart phone and white list are verified, if verification is lost It loses, goes to step 403;
Step 403, starting locating module 202 and communication module 201, mobile memory 20 receive ground to former owner's information Location sends the physical location of the MAC Address of smart phone, IP address and mobile memory 20;
Step 404, former owner authorize the user, information of the mobile memory 20 to former owner's sending step 403 When, can be attached to " whether authorizing to the user " this option can be returned if former owner authorizes the user by SMS Multiple fixed character, or confirmation is linked by E-mail address, QQ, wechat opening, authorization, after authorization, white name are completed immediately MAC Address, the IP address of the smart phone are singly added,
Step 405,20 normal use of mobile memory.
Wherein the verification principle of the correction verification module 204 of step 402 is as follows:
1) it when mobile memory 20 is inserted into smart phone, is read by checking routine by access smart phone information;
2) MAC Address is verified, by comparing with the MAC Address recorded in white list, if the MAC Address is not present in white name Dan Zhong carries out step 3).
3) verify IP address section, by in white list IP address section compare, if it exists in white list, then succeed, Mobile memory normal use starts correction verification module failure if verification failure.
If former owner or other users are accidentally lost or are stolen during using mobile memory 20, when illegal Mobile memory 20 is inserted into smart phone in use, former owner can chase after according to method as shown in Figure 5 by user Track is given for change, comprising the following steps:
Step 501, mobile memory 20 connect smart phone;
Step 502, starting correction verification module 204;
Step 503, starting communication module 201 and locating module 202: locating module 202 detects physical location information, communication The information that physical location information, MAC Address, IP address section are sent to former owner is received address by module 201, and verification is equal twice Text entry is generated to be stored in system trough, it is for future reference to see.
Mobile memory 20 is given in step 504, tracking for change: former owner receives the mobile memory that address obtains according to information Physical location information, be inserted into the MAC Address of smart phone, IP address section, mobile memory is given in tracking for change.
Embodiment three
A kind of mobile memory 20 of the integrated power with tracking function, as shown in Fig. 2, including communication module 201, locating module 202, system trough 203, correction verification module 204, integrated power 205,
Communication module 201, the physical location information and end message of the mobile memory 20 that locating module 202 is detected The information for being sent to former owner receives address, and communication module 201 is WIFI connection, supports CDMA, EDGE, GPRS network class Type, and networked and permitted by Ministry of Industry and Information;
Locating module 202, including GPS or Beidou, can be detached from wireless Internet and wired internet determines that movement is deposited The physical location of reservoir;
System reserved 203 initializes mobile memory 20 when connecting computer for the first time for mobile memory 20, Then the information for reading first connection computer, according to computer IP address, MAC Address, gateway information, DNS generate unique verification Key and generation white list, and bind the phone number, E-mail address, wechat number, QQ number code of former owner;
The information of correction verification module 204, detecting insertion terminal is verified with white list, if verification is unsuccessful, starting positioning Module and communication module;
Integrated power 205, including can charge-discharge battery, when being connected with terminal, can charge-discharge battery charging;It extracts When mobile memory, power-supply system is that locating module and communication module are powered.
It before former owner uses mobile memory 20 for the first time, needs to initialize it, as shown in figure 3, mobile storage The initialization process of device 20 is as follows:
Step 301, mobile memory 20 connect computer for the first time, and mobile memory 20 and computer are attached,
Whether step 302, mobile memory 20 initialize, and such as former owner's selection is no, then initialization process terminates, such as former Owner's selection is that mobile memory 20 is initialised, and goes to step 303;
Step 303, the information for reading computer include MAC Address, IP address, gateway information, DNS,
Step 304 generates unique check key according to the computerized information of step 303 and generates white list,
Step 305, the reception address for binding former owner, the reception address of former owner includes phone number, electronics postal Case, wechat number, QQ number code.
Step 306, setting timing feedback time point, former owner can be when timing feedback be arranged in system trough Between, timing feedback time point is arrived, mobile memory 20 sends location information to owner.
Former owner gives mobile memory 20 to other users in use, other users can be by white list i.e. Shi Shouquan comes using mobile memory 20, and the method referring to shown in Fig. 4 a) is as follows:
Step 401, mobile memory 20 connect computer, after mobile memory 20 is accessed other computers by other users;
Step 402, starting correction verification module 204, the information for connecting computer and white list are verified, if verification failure, Go to step 403;
Step 403, starting locating module 202 and communication module 201, mobile memory 20 send computer to former owner The physical location of MAC Address, IP address and mobile memory 20;
Step 404, former owner authorize the user, information of the mobile memory 20 to former owner's sending step 403 When, can be attached to " whether authorizing to the user " this option can be returned if former owner authorizes the user by SMS Multiple fixed character, or confirmation is linked by E-mail address, QQ, wechat opening, authorization, after authorization, white name are completed immediately MAC Address, the IP address of the computer are singly added,
Step 405,20 normal use of mobile memory.
Wherein the verification principle of the correction verification module 204 of step 402 is as follows:
1) it when mobile memory is inserted into computer, is read by checking routine by access computerized information;
2) MAC Address is verified, by comparing with the MAC Address recorded in white list, if the MAC Address is not present in white name Dan Zhong carries out step 3).
3) verify IP address section, by in white list IP address section compare, if it exists in white list, then succeed, Mobile memory normal use starts correction verification module failure if verification failure.
If former owner or other users are accidentally lost or are stolen during using mobile memory, former owner It can be tracked and be given for change according to method as shown in FIG. 6 by the function at the setting timing feedback time point of mobile memory, The following steps are included:
Step 601 has arrived timing feedback time point;
Step 602, starting communication module 201 and locating module 202: the physics of the detecting mobile memory of locating module 202 The information that the physical location information of mobile memory 20 is sent to former owner is received address by location information, communication module 201;
Step 603, tracking mobile memory 20: former owner receives the mobile memory 20 that address obtains according to information Mobile memory 20 is given in physical location information, tracking for change.
Example IV
A kind of mobile memory 20 with tracking retrieval function integrated power, as shown in Fig. 2, including communication module 201, locating module 202, system trough 203, correction verification module 204, integrated power 205,
Communication module 201, the physical location information and end message of the mobile memory 20 that locating module 202 is detected The information for being sent to former owner receives address, and communication module 201 is WIFI connection, supports CDMA, EDGE, GPRS network class Type, and networked and permitted by Ministry of Industry and Information;
Locating module 202 is GPS or Beidou, can be detached from wireless Internet and wired internet determines mobile storage The physical location of device;
System trough 203 when for mobile memory 20, connection has the terminal of MAC Address for the first time, is stored to mobile Device 20 is initialized, and then reading first connection has the information of terminal of MAC Address, according to the terminal with MAC Address Information generates unique check key, and binds former owner's phone number, E-mail address, wechat number, QQ number code, the tool The end message for having MAC Address includes IP address, MAC Address, gateway information, DNS,
The information of correction verification module 204, detecting insertion terminal is verified with white list, if verification is unsuccessful, starting positioning Module and communication module;
Integrated power 205, including can charge-discharge battery, when being connected with terminal, can charge-discharge battery charging;It extracts When mobile memory, power-supply system is that locating module and communication module are powered.
It before former owner uses mobile memory 20 for the first time, needs to initialize it, as shown in figure 3, mobile storage The initialization process of device 20 is as follows:
The connection for the first time of step 301, mobile memory 20 has the terminal of MAC Address, by mobile memory 20 and has MAC The terminal of address is attached,
Whether step 302, mobile memory 20 initialize, and such as former owner's selection is no, then initialization process terminates, such as former Owner's selection is that mobile memory 20 is initialised, and goes to step 303;
Step 303, reading has the information of the terminal of MAC Address includes MAC Address, IP address, gateway information, DNS,
Step 304 generates unique check key according to the end message with MAC Address of step 303 and generates white List,
Step 305, the reception address for binding former owner, the reception address of former owner includes phone number, electronics postal Case, wechat number, QQ number code.
Former owner gives mobile memory 20 to other users in use, former owner passes through computer client or hand Machine APP directly authorizes other users, and the method referring to shown in Fig. 4 b) is as follows:
Step 410, former owner download the computer client or cell phone application of mobile memory 20;
Step 411, former owner enter the computer client or mobile phone of mobile memory 20 by unique check password APP;
Step 412, former owner's addition or deleting MAC address, IP address.
If former owner or other users are accidentally lost or are stolen during using mobile memory 20, original possesses Person can give mobile memory 20 for change by computer client or cell phone application tracking, comprising the following steps:
Step 701, former owner download 20 computer client of mobile memory or cell phone application;
Step 702, former owner enter the computer client or hand of mobile memory 20 by unique check password Machine APP;
Step 703, former owner obtain the physical location of mobile memory 20 by computer client or cell phone application;
Step 704 judges whether mobile memory 20 is lost according to the physical location of mobile memory 20, if so, being transferred to Step 705;
Mobile memory 20 is given in step 705, tracking for change, according to mobile memory 20 in computer client or cell phone application Location information give for change.
Above embodiments are only exemplary embodiment of the present invention, are not used in the limitation present invention, those skilled in the art can With within the scope of the present invention, various modifications or equivalent replacements are made to the present invention, this modification or equivalent replacement are also answered It is considered as and is within the scope of the present invention.

Claims (10)

1. a kind of mobile memory with tracking function, it is characterised in that including system trough, correction verification module, positioning mould Block, communication module;
The system trough, the inside write-in pairing verification file are first by the mobile memory for former owner When connecting terminal, mobile memory is initialized, then reads the information of first connection terminal, according to first connection terminal Information generate unique check key and white list, and the information for binding former owner receives address;
The information of the correction verification module, detecting insertion terminal is compared with white list, and information mismatches, and starts locating module And communication module;
The locating module is detached from wired or wireless internet, determines the physical location of mobile memory;
The communication module, physical location information and the end message hair for the mobile memory that the locating module is detected The information for being sent to former owner receives address;
The mobile memory further includes integrated power, the integrated power include can charge-discharge battery, when It, can charge-discharge battery charging when being connected with terminal;When extracting terminal, integrated power is that locating module and communication module supply Electricity;
The mobile memory, is given for change using following methods:
(a) former owner downloads mobile memory computer client or cell phone application;
(b) former owner enters mobile memory computer client or cell phone application by unique check password;
(c) former owner obtains the physical location of mobile memory by computer client or cell phone application;
(d) judge whether mobile memory is lost according to the physical location of mobile memory, if so, being transferred to step (e);
(e) mobile memory is given in tracking for change, is looked for according to the location information of mobile memory in computer client or cell phone application It returns.
2. a kind of mobile memory with tracking function as described in claim 1, it is characterised in that: locating module is GPS Or Beidou.
3. a kind of mobile memory with tracking function as described in claim 1, it is characterised in that: the communication mould Block, including WIFI connection support CDMA, EDGE, GPRS network type, and are networked and permitted by Ministry of Industry and Information.
4. a kind of mobile memory with tracking function as described in claim 1, it is characterised in that: be used to store to mobile The first connection terminal that device is initialized is that have the terminal of MAC Address.
5. a kind of mobile memory with tracking function as described in claim 1, it is characterised in that: the first connection is eventually The information at end includes MAC Address, IP address, gateway information, DNS.
6. a kind of mobile memory with tracking function as described in claim 1, it is characterised in that: the original owner's It includes phone number, E-mail address, wechat number, QQ number code that information, which receives address,.
7. a kind of mobile memory with tracking function as described in claim 1, it is characterised in that: the white list is logical Following steps are crossed to be added:
A) mobile memory connects terminal;
B) start correction verification module, the information and white list of detecting connection terminal are verified, if verification failure, goes to step C);
C) start locating module and communication module, locating module confirms that the physical location of mobile memory, communication module are gathered around to original The person of having sends the information of terminal and the physical location information of mobile memory;
D) former owner authorizes other users, replys fixed character by SMS, or by E-mail address, QQ, Wechat opening is linked into confirmation, and white list can add end message after authorization.
8. a kind of mobile memory with tracking function as described in claim 1, it is characterised in that: former owner passes through electricity Brain client or cell phone application modify to the white list:
<1>former owner downloads the computer client or cell phone application of mobile memory;
<2>former owner's input unique key enters cell phone application or computer client;
<3>former owner modifies in white list after entering cell phone application or computer client.
9. a kind of tracking method for retrieving of mobile memory, described using any mobile memory of claim 1 to 8 System trough be arranged timing feedback, every timing feedback time point, to owner send mobile memory physical location Information.
10. a kind of tracking method for retrieving of mobile memory, special using any mobile memory of claim 1 to 8 Sign be the following steps are included:
(A) timing feedback time point has been arrived;
(B) start communication module and locating module, locating module detects the physical location information of mobile memory, and communication module will The information that the physical location information of mobile memory is sent to former owner receives address;
(C) mobile memory is given in tracking for change: former owner receives the physical location for the mobile memory that address obtains according to information Mobile memory is given in information, tracking for change.
CN201610322970.2A 2016-05-16 2016-05-16 A kind of mobile memory and tracking method for retrieving with tracking function Active CN105825157B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610322970.2A CN105825157B (en) 2016-05-16 2016-05-16 A kind of mobile memory and tracking method for retrieving with tracking function

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610322970.2A CN105825157B (en) 2016-05-16 2016-05-16 A kind of mobile memory and tracking method for retrieving with tracking function

Publications (2)

Publication Number Publication Date
CN105825157A CN105825157A (en) 2016-08-03
CN105825157B true CN105825157B (en) 2018-12-07

Family

ID=56529602

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610322970.2A Active CN105825157B (en) 2016-05-16 2016-05-16 A kind of mobile memory and tracking method for retrieving with tracking function

Country Status (1)

Country Link
CN (1) CN105825157B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108600153A (en) * 2018-03-05 2018-09-28 北京小米移动软件有限公司 Verification method and device
CN109005183B (en) * 2018-08-15 2020-10-09 深圳市泰钦园贸易有限公司 Information anti-loss method based on chip ID number and network MAC address

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102930892A (en) * 2012-09-19 2013-02-13 无锡华御信息技术有限公司 Multifunctional safe U disk
CN104852948A (en) * 2014-02-14 2015-08-19 尚宏电子股份有限公司 Data access device and access method thereof
CN204695301U (en) * 2015-06-08 2015-10-07 湖南纽思曼存储科技有限公司 A kind of multi-functional encryption portable hard drive
CN105005722A (en) * 2015-06-26 2015-10-28 北京北信源软件股份有限公司 Access control method and apparatus for mobile storage device
CN204791973U (en) * 2015-04-17 2015-11-18 苏州市职业大学 Fingerprint lock USB flash disk

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102930892A (en) * 2012-09-19 2013-02-13 无锡华御信息技术有限公司 Multifunctional safe U disk
CN104852948A (en) * 2014-02-14 2015-08-19 尚宏电子股份有限公司 Data access device and access method thereof
CN204791973U (en) * 2015-04-17 2015-11-18 苏州市职业大学 Fingerprint lock USB flash disk
CN204695301U (en) * 2015-06-08 2015-10-07 湖南纽思曼存储科技有限公司 A kind of multi-functional encryption portable hard drive
CN105005722A (en) * 2015-06-26 2015-10-28 北京北信源软件股份有限公司 Access control method and apparatus for mobile storage device

Also Published As

Publication number Publication date
CN105825157A (en) 2016-08-03

Similar Documents

Publication Publication Date Title
CN102497635B (en) Server, terminal and account password acquisition method
CN104601324B (en) A kind of verification method, terminal and system for application
CN105933888B (en) A kind of eSIM card method for burn-recording and device based on NFC
CN101527630B (en) Method, server and system for manufacturing certificate remotely
CN106293816B (en) A method of increasing the viscosity of the App of user and mobile intelligent terminal installation
CN101605325B (en) Method for identity authentication, mobile terminal, server, and identity authentication system
CN111918243B (en) Digital vehicle key management method and device, vehicle and storage medium
CN107040927A (en) Wireless network focus sharing method and device, computer installation and storage medium
CN101272242A (en) Mobile memory system and method based on network
CN106296900B (en) A method of opening smart lock
CN104113842B (en) Method, device, server and mobile terminal for identifying pseudo wireless network access point
CN101841812B (en) Terminal legality verifying method and device and communication system
CN103840944A (en) Short message authentication method, server and system
CN103458407B (en) A kind of Internet account number login management system and method based on note
CN101599832A (en) A kind of personal identification method and system that realize the network system login
CN105992204A (en) Access authentication method of applications of mobile intelligent terminal and device
CN107197462A (en) Detection method, device and the electronic equipment of wireless network type
CN104660401A (en) Authentication method, authentication system and terminal
CN106228654A (en) A kind of method of user account binding smart lock
CN108809982B (en) Secret-free authentication method and system based on trusted execution environment
CN103118087A (en) Mobile communication terminal and method and system of protecting data thereof
CN105825157B (en) A kind of mobile memory and tracking method for retrieving with tracking function
CN101594611A (en) The method of authentication and portable terminal, server and identity authorization system
CN104980899A (en) Communication method and system for mobile terminal, mobile terminal and server
CN102984335A (en) Identity authentication method, equipment and system for making fixed-line call

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant