CN105825157B - A kind of mobile memory and tracking method for retrieving with tracking function - Google Patents
A kind of mobile memory and tracking method for retrieving with tracking function Download PDFInfo
- Publication number
- CN105825157B CN105825157B CN201610322970.2A CN201610322970A CN105825157B CN 105825157 B CN105825157 B CN 105825157B CN 201610322970 A CN201610322970 A CN 201610322970A CN 105825157 B CN105825157 B CN 105825157B
- Authority
- CN
- China
- Prior art keywords
- mobile memory
- information
- former owner
- address
- mobile
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/88—Detecting or preventing theft or loss
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephone Function (AREA)
Abstract
It include system trough, correction verification module, locating module, communication module the invention discloses a kind of mobile memory with tracking function;The method given for change is tracked the invention also discloses mobile memory loss or after being stolen, after the invention has the advantages that mobile memory is lost or is stolen, the connection terminal of mobile memory is regardless of whether networking, even if even the loss or stolen mobile memory be connected terminal carry out using, it can also be tracked and give for change, and the loss or stolen mobile memory confidentiality are high, it is not easy to be cracked.
Description
Technical field
The present invention relates to a kind of mobile memory and method, in particular to a kind of mobile memory with tracking function with
And mobile memory loses or the stolen rear traceable method given for change.
Background technique
With the development of electronics technology and the progress of mobile memory, high-capacity and high-speed mobile memory because its high speed, can
It leans on, is frivolous, the advantage that noise is small, becoming electronic product mainstream.
The volume of mobile memory is little, has the situation lost and be stolen and occurs.Application number 201010247029.1 is special
Sharp entitled " traceable flash memory device, system and method for tracing " disclose a kind of traceable flash memory device,
System and method for tracing detect identity and continuously compare errors number greater than error thresholds, determine to move by losing judging unit
The state of dynamic storage device is to lose, and virtually provides the probability for cracking identity information to illegal owner, confidentiality is not high;
After judging the state of flash memory device to lose, the electronic equipment for needing flash memory device to connect is in connected state, leads to
Network interface card sequence number, IP address and the default gateway of tracking electronic equipment are crossed to confirm the position of flash memory device, can not be determined
The specifically used physical location of the position equipment, the precision and poor in timeliness of tracking are helpless for non-networked situation.
Summary of the invention
To overcome the problems of the above-mentioned prior art, the present invention provide a kind of mobile memory with tracking function and
Method for retrieving is tracked, which has the advantages that
After mobile memory is lost or is stolen, the connection terminal of mobile memory is regardless of whether networking, mobile memory
It can be tracked and give for change;Even if even the loss or stolen mobile memory be connected terminal carry out using,
It can be tracked and give for change;And the loss or stolen mobile memory confidentiality are high, it is not easy to be cracked.
To achieve the above object, the invention provides the following technical scheme:
The invention discloses a kind of mobile memories with tracking function, including system trough, correction verification module, positioning
Module, communication module;
The system trough, the inside write-in pairing verification file, for former owner by the mobile memory
When first connection terminal, mobile memory is initialized, the information of first connection terminal is then read, according to first connection
The information of terminal generates unique check key and white list, and the information for binding former owner receives address;
The information of the correction verification module, detecting insertion terminal is compared with white list, and information mismatches, starting positioning
Module and communication module;
The locating module, can be detached from wireless Internet and wired internet determines the object of the mobile memory
Manage position;
The communication module, physical location information and the terminal letter for the mobile memory that the locating module is detected
The information that breath is sent to former owner receives address.
Preferably, locating module is GPS or Beidou.
Preferably, the communication module, including WIFI connection are supported CDMA, EDGE, GPRS network type, and are led to
It crosses Ministry of Industry and Information and networks and permit.
Preferably, the first connection terminal for being initialized to mobile memory is computer, smart phone or tool
There are other terminals of MAC Address.
Preferably, the information of the first connection terminal includes MAC Address, IP address, computer gateway information, DNS.
Preferably, it includes phone number, E-mail address, wechat number, QQ number that the information of the former owner, which receives address,
Code.
Preferably, the white list can be added by following steps:
1) mobile memory connects terminal;
2) start correction verification module, the information and white list of detecting connection terminal are verified, if verification failure, goes to step
3;
3) start locating module and communication module, locating module confirms the physical location of mobile memory, communication module to
Former owner sends the information of terminal and the physical location information of mobile memory;
4) former owner authorizes the user, can reply fixed character by SMS, or by E-mail address,
QQ, wechat opening are linked into confirmation, and white list can add the end message after authorization.
Preferably, former owner modifies to the white list by computer client or cell phone application:
1) former owner downloads the computer client or cell phone application of mobile memory;
2) former owner's input unique key enters cell phone application or computer client;
3) former owner modifies in white list after entering cell phone application or computer client.
Preferably, mobile memory further includes integrated power, including can charge-discharge battery, when being connected with terminal,
It can charge-discharge battery charging;When extracting mobile memory, integrated power is that locating module and communication module are powered.
Preferably, timing feedback, every timing feedback time is arranged in the system trough of mobile memory in former owner
Point sends the physical location information of mobile memory to owner.
When mobile memory insertion power interface with tracking retrieval function integrated power starts power supply, can it hold
It opens locating module and receives address with communication module, the information bound to former owner and feed back mobile memory physical bit confidence
Breath.
The invention also discloses a kind of tracking method for retrieving of mobile memory, for the mobile storage with tracking function
Device, which is lost or tracked after stolen it, to be given for change, comprising the following steps:
(1) mobile memory connects terminal
(2) start correction verification module, the information of detecting insertion terminal is compared with white list, and information mismatches, and goes to step
Suddenly (3);
(3) start communication module and locating module: locating module detects physical location information, and communication module is stored mobile
Device physical location information, the information that the MAC Address of terminal, IP address section are sent to former owner receive address, and verification is equal twice
Text entry is generated to be stored in system trough, it is for future reference to see.
(4) mobile memory is given in tracking for change: former owner receives the physics for the mobile memory that address obtains according to information
Mobile memory is given in the information of location information, terminal, tracking for change.
The invention also discloses a kind of mobile memories to track method for retrieving, packet by computer client or cell phone application
Include following steps:
(1) former owner downloads mobile memory computer client or cell phone application;
(2) former owner enters mobile memory computer client or cell phone application by unique check password;
(3) former owner obtains the physical location of mobile memory by computer client or cell phone application;
(4) judge whether mobile memory is lost according to the physical location of mobile memory, if so, being transferred to step (5);
(5) mobile memory is given in tracking for change, according to the location information of mobile memory in computer client or cell phone application
It gives for change.
The invention also discloses a kind of mobile memories to track method for retrieving by timing feedback, for having tracking function
Mobile memory lose or it tracked after stolen and give for change, comprising the following steps:
(1) timing feedback time point has been arrived;
(2) start communication module and locating module, locating module detects the physical location information of mobile memory, communicates mould
The information that the physical location information of mobile memory is issued to former owner is received address by block;
(3) mobile memory is given in tracking for change: former owner receives the physics for the mobile memory that address obtains according to information
Mobile memory is given in location information, tracking for change.
During mobile memory use, former owner, both can be by limiting IP sections or leading to according to personal use needs
Restriction MAC Address is crossed to control using area, and white list can be managed with computer client or cell phone application.
Detailed description of the invention
Fig. 1 is mobile memory structural schematic diagram;
Fig. 2 is the mobile memory structural schematic diagram of integrated power;
Fig. 3 is mobile memory initialization flowchart;
Fig. 4 a), 4b) be mobile memory white list modification process figure;
Fig. 5, which is mobile memory, is tracked method for retrieving by connecting illegal terminal;
Fig. 6 is that mobile memory by computer client or cell phone application is tracked method for retrieving;
Fig. 7 is that mobile memory by timing feedback is tracked method for retrieving;
Specific embodiment
Embodiment one
A kind of mobile memory 10 with tracking function, as shown in Figure 1, including system trough 101, correction verification module
102, locating module 103, communication module 104;
System trough 101 carries out initially mobile memory 10 when connecting computer for the first time for mobile memory 10
Change, then read the information of first connection computer, according to computer IP address, MAC Address, gateway information, DNS generate unique school
Key and white list are tested, and binds the phone number, E-mail address, wechat number, QQ number code of former owner;
The information of correction verification module 102, detecting insertion terminal is verified with white list, verifies unsuccessful, starting positioning mould
Block and communication module;
Locating module 103 is GPS or Beidou, is detached from wireless Internet and wired internet determines mobile memory
Physical location;
Communication module 104, the physical location information and end message of the mobile memory 10 that locating module 103 is detected
The information for being sent to former owner receives address, and communication module 104 is WIFI connection, supports CDMA, EDGE, GPRS network class
Type, and networked and permitted by Ministry of Industry and Information;
It before former owner uses mobile memory 10 for the first time, needs to initialize it, as shown in figure 3, mobile storage
The initialization process of device 10 is as follows:
Step 301, mobile memory 10 connect computer for the first time, and mobile memory 10 and computer are attached,
Whether step 302, mobile memory 10 initialize, and such as former owner's selection is no, then initialization process terminates, such as former
Owner's selection is that mobile memory 10 is initialised, and goes to step 303;
Step 303, the information for reading first computer include MAC Address, IP address, gateway information, DNS,
Step 304 generates unique check key according to the information of first computer and generates white list,
Step 305, the reception address for binding former owner, the reception address of former owner includes phone number, electronics postal
Case, wechat number, QQ number code.
Former owner gives mobile memory 10 to other users in use, other users can be by white list i.e.
Shi Shouquan comes using mobile memory 10, and the method referring to shown in Fig. 4 a) is as follows:
Step 401, mobile memory 10 connect computer, after mobile memory 10 is accessed other computers by other users,
Computer power supply;
Step 402, starting correction verification module, the information for connecting computer and white list are verified, if verification failure, goes to
Step 403;
Step 403, starting locating module and communication module, mobile memory 10 send the MAC of computer to former owner
Location, IP address and mobile memory 10 physical location;
Step 404, former owner authorize the user, information of the mobile memory 10 to former owner's sending step 403
When, can be attached to " whether authorizing to the user " this option can be returned if former owner authorizes the user by SMS
Multiple fixed character, or confirmation is linked by E-mail address, QQ, wechat opening, authorization, after authorization, white name are completed immediately
MAC Address, the IP address of the computer are singly added,
Step 405,10 normal use of mobile memory.
Wherein the verification principle of the correction verification module of step 402 is as follows:
1) it when mobile memory is inserted into computer, is read by checking routine by access computerized information;
2) MAC Address is verified, by comparing with the MAC Address recorded in white list, if the MAC Address is not present in white name
Dan Zhong carries out step 3).
3) verify IP address section, by in white list IP address section compare, if it exists in white list, then succeed,
Mobile memory normal use starts correction verification module failure if verification failure.
If former owner or other users are accidentally lost or are stolen during using mobile memory, make when illegally
Mobile memory is inserted into computer to user in use, former owner can be tracked according to method as shown in Figure 5 and give for change, wraps
Include following steps:
Step 501, mobile memory connect computer;
Step 502, starting correction verification module;
1) it when mobile memory is inserted into computer, is read by checking routine by access computerized information;
2) MAC Address is verified, by comparing with the MAC Address recorded in white list, if the MAC Address is present in white list
In, then verify success, mobile memory normal use.
If 3) MAC Address of computer is not present in white list, failure is verified, verifies IP address section after verification failure,
Same pass through compares with the IP address section in white list, if it exists in white list, then succeeds, mobile memory normal use.
Step 503, starting communication module and locating module: locating module detects physical location information, and communication module will move
The information that the physical location information of dynamic memory, the MAC Address for connecting computer, IP address section are sent to former owner receives ground
Location verifies generation text entry twice and is stored in system trough, for future reference to see.
Mobile memory is given in step 504, tracking for change: former owner receives the mobile memory object that address obtains according to information
Location information, the MAC Address for being inserted into computer, IP address section are managed, mobile memory is given in tracking for change.
Embodiment two
It is a kind of track retrieval function integrated power mobile memory 20, as shown in Fig. 2, include communication module 201,
Locating module 202, system trough 203, correction verification module 204, integrated power 205;
Communication module 201, the physical location information and terminal of the mobile memory 20 that the locating module 202 is detected
The information that information is sent to former owner receives address, and communication module 201 is WIFI connection, supports CDMA, EDGE, GPRS network
Type, and networked and permitted by Ministry of Industry and Information;
Locating module 202 is GPS or Beidou, can be detached from wireless Internet and wired internet determines mobile storage
The physical location of device;
System trough 203 carries out just mobile memory 20 when connecting smart phone for the first time for mobile memory 20
Then beginningization reads the information of first connection smart phone, according to smart phone IP address, MAC Address, gateway information, DNS are raw
At unique check key, and bind the phone number, E-mail address, wechat number, QQ number code of former owner;
The information of correction verification module 204, detecting insertion terminal is verified with white list, if verification is unsuccessful, starting positioning
Module and communication module;
Integrated power 205, including can charge-discharge battery, when being connected with terminal, can charge-discharge battery charging;It extracts
When mobile memory, integrated power is that locating module and communication module are powered.
It before former owner uses mobile memory 20 for the first time, needs to initialize it, as shown in figure 3, mobile storage
The initialization process of device 20 is as follows:
Step 301, mobile memory 20 connect smart phone for the first time, and mobile memory 20 and smart phone are connected
It connects,
Whether step 302, mobile memory 20 initialize, and such as former owner's selection is no, then initialization process terminates, such as former
Owner's selection is that mobile memory 20 is initialised, and goes to step 303;
Step 303, the information for reading first smart phone comprising MAC Address, IP address, gateway information, DNS;
Step 304 generates unique check key according to first smart phone information and generates white list;
Step 305, the reception address for binding former owner, the reception address of former owner includes phone number, electronics postal
Case, wechat number, QQ number code.
Former owner gives mobile memory 20 to other users in use, other users can be by white list i.e.
Shi Shouquan comes using mobile memory 20, and the method referring to shown in Fig. 4 a) is as follows:
Step 401, mobile memory 20 connect smart phone, and mobile memory 20 is accessed other intelligence by other users
After mobile phone;
Step 402, starting correction verification module 204, the information for connecting smart phone and white list are verified, if verification is lost
It loses, goes to step 403;
Step 403, starting locating module 202 and communication module 201, mobile memory 20 receive ground to former owner's information
Location sends the physical location of the MAC Address of smart phone, IP address and mobile memory 20;
Step 404, former owner authorize the user, information of the mobile memory 20 to former owner's sending step 403
When, can be attached to " whether authorizing to the user " this option can be returned if former owner authorizes the user by SMS
Multiple fixed character, or confirmation is linked by E-mail address, QQ, wechat opening, authorization, after authorization, white name are completed immediately
MAC Address, the IP address of the smart phone are singly added,
Step 405,20 normal use of mobile memory.
Wherein the verification principle of the correction verification module 204 of step 402 is as follows:
1) it when mobile memory 20 is inserted into smart phone, is read by checking routine by access smart phone information;
2) MAC Address is verified, by comparing with the MAC Address recorded in white list, if the MAC Address is not present in white name
Dan Zhong carries out step 3).
3) verify IP address section, by in white list IP address section compare, if it exists in white list, then succeed,
Mobile memory normal use starts correction verification module failure if verification failure.
If former owner or other users are accidentally lost or are stolen during using mobile memory 20, when illegal
Mobile memory 20 is inserted into smart phone in use, former owner can chase after according to method as shown in Figure 5 by user
Track is given for change, comprising the following steps:
Step 501, mobile memory 20 connect smart phone;
Step 502, starting correction verification module 204;
Step 503, starting communication module 201 and locating module 202: locating module 202 detects physical location information, communication
The information that physical location information, MAC Address, IP address section are sent to former owner is received address by module 201, and verification is equal twice
Text entry is generated to be stored in system trough, it is for future reference to see.
Mobile memory 20 is given in step 504, tracking for change: former owner receives the mobile memory that address obtains according to information
Physical location information, be inserted into the MAC Address of smart phone, IP address section, mobile memory is given in tracking for change.
Embodiment three
A kind of mobile memory 20 of the integrated power with tracking function, as shown in Fig. 2, including communication module
201, locating module 202, system trough 203, correction verification module 204, integrated power 205,
Communication module 201, the physical location information and end message of the mobile memory 20 that locating module 202 is detected
The information for being sent to former owner receives address, and communication module 201 is WIFI connection, supports CDMA, EDGE, GPRS network class
Type, and networked and permitted by Ministry of Industry and Information;
Locating module 202, including GPS or Beidou, can be detached from wireless Internet and wired internet determines that movement is deposited
The physical location of reservoir;
System reserved 203 initializes mobile memory 20 when connecting computer for the first time for mobile memory 20,
Then the information for reading first connection computer, according to computer IP address, MAC Address, gateway information, DNS generate unique verification
Key and generation white list, and bind the phone number, E-mail address, wechat number, QQ number code of former owner;
The information of correction verification module 204, detecting insertion terminal is verified with white list, if verification is unsuccessful, starting positioning
Module and communication module;
Integrated power 205, including can charge-discharge battery, when being connected with terminal, can charge-discharge battery charging;It extracts
When mobile memory, power-supply system is that locating module and communication module are powered.
It before former owner uses mobile memory 20 for the first time, needs to initialize it, as shown in figure 3, mobile storage
The initialization process of device 20 is as follows:
Step 301, mobile memory 20 connect computer for the first time, and mobile memory 20 and computer are attached,
Whether step 302, mobile memory 20 initialize, and such as former owner's selection is no, then initialization process terminates, such as former
Owner's selection is that mobile memory 20 is initialised, and goes to step 303;
Step 303, the information for reading computer include MAC Address, IP address, gateway information, DNS,
Step 304 generates unique check key according to the computerized information of step 303 and generates white list,
Step 305, the reception address for binding former owner, the reception address of former owner includes phone number, electronics postal
Case, wechat number, QQ number code.
Step 306, setting timing feedback time point, former owner can be when timing feedback be arranged in system trough
Between, timing feedback time point is arrived, mobile memory 20 sends location information to owner.
Former owner gives mobile memory 20 to other users in use, other users can be by white list i.e.
Shi Shouquan comes using mobile memory 20, and the method referring to shown in Fig. 4 a) is as follows:
Step 401, mobile memory 20 connect computer, after mobile memory 20 is accessed other computers by other users;
Step 402, starting correction verification module 204, the information for connecting computer and white list are verified, if verification failure,
Go to step 403;
Step 403, starting locating module 202 and communication module 201, mobile memory 20 send computer to former owner
The physical location of MAC Address, IP address and mobile memory 20;
Step 404, former owner authorize the user, information of the mobile memory 20 to former owner's sending step 403
When, can be attached to " whether authorizing to the user " this option can be returned if former owner authorizes the user by SMS
Multiple fixed character, or confirmation is linked by E-mail address, QQ, wechat opening, authorization, after authorization, white name are completed immediately
MAC Address, the IP address of the computer are singly added,
Step 405,20 normal use of mobile memory.
Wherein the verification principle of the correction verification module 204 of step 402 is as follows:
1) it when mobile memory is inserted into computer, is read by checking routine by access computerized information;
2) MAC Address is verified, by comparing with the MAC Address recorded in white list, if the MAC Address is not present in white name
Dan Zhong carries out step 3).
3) verify IP address section, by in white list IP address section compare, if it exists in white list, then succeed,
Mobile memory normal use starts correction verification module failure if verification failure.
If former owner or other users are accidentally lost or are stolen during using mobile memory, former owner
It can be tracked and be given for change according to method as shown in FIG. 6 by the function at the setting timing feedback time point of mobile memory,
The following steps are included:
Step 601 has arrived timing feedback time point;
Step 602, starting communication module 201 and locating module 202: the physics of the detecting mobile memory of locating module 202
The information that the physical location information of mobile memory 20 is sent to former owner is received address by location information, communication module 201;
Step 603, tracking mobile memory 20: former owner receives the mobile memory 20 that address obtains according to information
Mobile memory 20 is given in physical location information, tracking for change.
Example IV
A kind of mobile memory 20 with tracking retrieval function integrated power, as shown in Fig. 2, including communication module
201, locating module 202, system trough 203, correction verification module 204, integrated power 205,
Communication module 201, the physical location information and end message of the mobile memory 20 that locating module 202 is detected
The information for being sent to former owner receives address, and communication module 201 is WIFI connection, supports CDMA, EDGE, GPRS network class
Type, and networked and permitted by Ministry of Industry and Information;
Locating module 202 is GPS or Beidou, can be detached from wireless Internet and wired internet determines mobile storage
The physical location of device;
System trough 203 when for mobile memory 20, connection has the terminal of MAC Address for the first time, is stored to mobile
Device 20 is initialized, and then reading first connection has the information of terminal of MAC Address, according to the terminal with MAC Address
Information generates unique check key, and binds former owner's phone number, E-mail address, wechat number, QQ number code, the tool
The end message for having MAC Address includes IP address, MAC Address, gateway information, DNS,
The information of correction verification module 204, detecting insertion terminal is verified with white list, if verification is unsuccessful, starting positioning
Module and communication module;
Integrated power 205, including can charge-discharge battery, when being connected with terminal, can charge-discharge battery charging;It extracts
When mobile memory, power-supply system is that locating module and communication module are powered.
It before former owner uses mobile memory 20 for the first time, needs to initialize it, as shown in figure 3, mobile storage
The initialization process of device 20 is as follows:
The connection for the first time of step 301, mobile memory 20 has the terminal of MAC Address, by mobile memory 20 and has MAC
The terminal of address is attached,
Whether step 302, mobile memory 20 initialize, and such as former owner's selection is no, then initialization process terminates, such as former
Owner's selection is that mobile memory 20 is initialised, and goes to step 303;
Step 303, reading has the information of the terminal of MAC Address includes MAC Address, IP address, gateway information, DNS,
Step 304 generates unique check key according to the end message with MAC Address of step 303 and generates white
List,
Step 305, the reception address for binding former owner, the reception address of former owner includes phone number, electronics postal
Case, wechat number, QQ number code.
Former owner gives mobile memory 20 to other users in use, former owner passes through computer client or hand
Machine APP directly authorizes other users, and the method referring to shown in Fig. 4 b) is as follows:
Step 410, former owner download the computer client or cell phone application of mobile memory 20;
Step 411, former owner enter the computer client or mobile phone of mobile memory 20 by unique check password
APP;
Step 412, former owner's addition or deleting MAC address, IP address.
If former owner or other users are accidentally lost or are stolen during using mobile memory 20, original possesses
Person can give mobile memory 20 for change by computer client or cell phone application tracking, comprising the following steps:
Step 701, former owner download 20 computer client of mobile memory or cell phone application;
Step 702, former owner enter the computer client or hand of mobile memory 20 by unique check password
Machine APP;
Step 703, former owner obtain the physical location of mobile memory 20 by computer client or cell phone application;
Step 704 judges whether mobile memory 20 is lost according to the physical location of mobile memory 20, if so, being transferred to
Step 705;
Mobile memory 20 is given in step 705, tracking for change, according to mobile memory 20 in computer client or cell phone application
Location information give for change.
Above embodiments are only exemplary embodiment of the present invention, are not used in the limitation present invention, those skilled in the art can
With within the scope of the present invention, various modifications or equivalent replacements are made to the present invention, this modification or equivalent replacement are also answered
It is considered as and is within the scope of the present invention.
Claims (10)
1. a kind of mobile memory with tracking function, it is characterised in that including system trough, correction verification module, positioning mould
Block, communication module;
The system trough, the inside write-in pairing verification file are first by the mobile memory for former owner
When connecting terminal, mobile memory is initialized, then reads the information of first connection terminal, according to first connection terminal
Information generate unique check key and white list, and the information for binding former owner receives address;
The information of the correction verification module, detecting insertion terminal is compared with white list, and information mismatches, and starts locating module
And communication module;
The locating module is detached from wired or wireless internet, determines the physical location of mobile memory;
The communication module, physical location information and the end message hair for the mobile memory that the locating module is detected
The information for being sent to former owner receives address;
The mobile memory further includes integrated power, the integrated power include can charge-discharge battery, when
It, can charge-discharge battery charging when being connected with terminal;When extracting terminal, integrated power is that locating module and communication module supply
Electricity;
The mobile memory, is given for change using following methods:
(a) former owner downloads mobile memory computer client or cell phone application;
(b) former owner enters mobile memory computer client or cell phone application by unique check password;
(c) former owner obtains the physical location of mobile memory by computer client or cell phone application;
(d) judge whether mobile memory is lost according to the physical location of mobile memory, if so, being transferred to step (e);
(e) mobile memory is given in tracking for change, is looked for according to the location information of mobile memory in computer client or cell phone application
It returns.
2. a kind of mobile memory with tracking function as described in claim 1, it is characterised in that: locating module is GPS
Or Beidou.
3. a kind of mobile memory with tracking function as described in claim 1, it is characterised in that: the communication mould
Block, including WIFI connection support CDMA, EDGE, GPRS network type, and are networked and permitted by Ministry of Industry and Information.
4. a kind of mobile memory with tracking function as described in claim 1, it is characterised in that: be used to store to mobile
The first connection terminal that device is initialized is that have the terminal of MAC Address.
5. a kind of mobile memory with tracking function as described in claim 1, it is characterised in that: the first connection is eventually
The information at end includes MAC Address, IP address, gateway information, DNS.
6. a kind of mobile memory with tracking function as described in claim 1, it is characterised in that: the original owner's
It includes phone number, E-mail address, wechat number, QQ number code that information, which receives address,.
7. a kind of mobile memory with tracking function as described in claim 1, it is characterised in that: the white list is logical
Following steps are crossed to be added:
A) mobile memory connects terminal;
B) start correction verification module, the information and white list of detecting connection terminal are verified, if verification failure, goes to step C);
C) start locating module and communication module, locating module confirms that the physical location of mobile memory, communication module are gathered around to original
The person of having sends the information of terminal and the physical location information of mobile memory;
D) former owner authorizes other users, replys fixed character by SMS, or by E-mail address, QQ,
Wechat opening is linked into confirmation, and white list can add end message after authorization.
8. a kind of mobile memory with tracking function as described in claim 1, it is characterised in that: former owner passes through electricity
Brain client or cell phone application modify to the white list:
<1>former owner downloads the computer client or cell phone application of mobile memory;
<2>former owner's input unique key enters cell phone application or computer client;
<3>former owner modifies in white list after entering cell phone application or computer client.
9. a kind of tracking method for retrieving of mobile memory, described using any mobile memory of claim 1 to 8
System trough be arranged timing feedback, every timing feedback time point, to owner send mobile memory physical location
Information.
10. a kind of tracking method for retrieving of mobile memory, special using any mobile memory of claim 1 to 8
Sign be the following steps are included:
(A) timing feedback time point has been arrived;
(B) start communication module and locating module, locating module detects the physical location information of mobile memory, and communication module will
The information that the physical location information of mobile memory is sent to former owner receives address;
(C) mobile memory is given in tracking for change: former owner receives the physical location for the mobile memory that address obtains according to information
Mobile memory is given in information, tracking for change.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610322970.2A CN105825157B (en) | 2016-05-16 | 2016-05-16 | A kind of mobile memory and tracking method for retrieving with tracking function |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610322970.2A CN105825157B (en) | 2016-05-16 | 2016-05-16 | A kind of mobile memory and tracking method for retrieving with tracking function |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105825157A CN105825157A (en) | 2016-08-03 |
CN105825157B true CN105825157B (en) | 2018-12-07 |
Family
ID=56529602
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610322970.2A Active CN105825157B (en) | 2016-05-16 | 2016-05-16 | A kind of mobile memory and tracking method for retrieving with tracking function |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105825157B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108600153A (en) * | 2018-03-05 | 2018-09-28 | 北京小米移动软件有限公司 | Verification method and device |
CN109005183B (en) * | 2018-08-15 | 2020-10-09 | 深圳市泰钦园贸易有限公司 | Information anti-loss method based on chip ID number and network MAC address |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102930892A (en) * | 2012-09-19 | 2013-02-13 | 无锡华御信息技术有限公司 | Multifunctional safe U disk |
CN104852948A (en) * | 2014-02-14 | 2015-08-19 | 尚宏电子股份有限公司 | Data access device and access method thereof |
CN204695301U (en) * | 2015-06-08 | 2015-10-07 | 湖南纽思曼存储科技有限公司 | A kind of multi-functional encryption portable hard drive |
CN105005722A (en) * | 2015-06-26 | 2015-10-28 | 北京北信源软件股份有限公司 | Access control method and apparatus for mobile storage device |
CN204791973U (en) * | 2015-04-17 | 2015-11-18 | 苏州市职业大学 | Fingerprint lock USB flash disk |
-
2016
- 2016-05-16 CN CN201610322970.2A patent/CN105825157B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102930892A (en) * | 2012-09-19 | 2013-02-13 | 无锡华御信息技术有限公司 | Multifunctional safe U disk |
CN104852948A (en) * | 2014-02-14 | 2015-08-19 | 尚宏电子股份有限公司 | Data access device and access method thereof |
CN204791973U (en) * | 2015-04-17 | 2015-11-18 | 苏州市职业大学 | Fingerprint lock USB flash disk |
CN204695301U (en) * | 2015-06-08 | 2015-10-07 | 湖南纽思曼存储科技有限公司 | A kind of multi-functional encryption portable hard drive |
CN105005722A (en) * | 2015-06-26 | 2015-10-28 | 北京北信源软件股份有限公司 | Access control method and apparatus for mobile storage device |
Also Published As
Publication number | Publication date |
---|---|
CN105825157A (en) | 2016-08-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102497635B (en) | Server, terminal and account password acquisition method | |
CN104601324B (en) | A kind of verification method, terminal and system for application | |
CN105933888B (en) | A kind of eSIM card method for burn-recording and device based on NFC | |
CN101527630B (en) | Method, server and system for manufacturing certificate remotely | |
CN106293816B (en) | A method of increasing the viscosity of the App of user and mobile intelligent terminal installation | |
CN101605325B (en) | Method for identity authentication, mobile terminal, server, and identity authentication system | |
CN111918243B (en) | Digital vehicle key management method and device, vehicle and storage medium | |
CN107040927A (en) | Wireless network focus sharing method and device, computer installation and storage medium | |
CN101272242A (en) | Mobile memory system and method based on network | |
CN106296900B (en) | A method of opening smart lock | |
CN104113842B (en) | Method, device, server and mobile terminal for identifying pseudo wireless network access point | |
CN101841812B (en) | Terminal legality verifying method and device and communication system | |
CN103840944A (en) | Short message authentication method, server and system | |
CN103458407B (en) | A kind of Internet account number login management system and method based on note | |
CN101599832A (en) | A kind of personal identification method and system that realize the network system login | |
CN105992204A (en) | Access authentication method of applications of mobile intelligent terminal and device | |
CN107197462A (en) | Detection method, device and the electronic equipment of wireless network type | |
CN104660401A (en) | Authentication method, authentication system and terminal | |
CN106228654A (en) | A kind of method of user account binding smart lock | |
CN108809982B (en) | Secret-free authentication method and system based on trusted execution environment | |
CN103118087A (en) | Mobile communication terminal and method and system of protecting data thereof | |
CN105825157B (en) | A kind of mobile memory and tracking method for retrieving with tracking function | |
CN101594611A (en) | The method of authentication and portable terminal, server and identity authorization system | |
CN104980899A (en) | Communication method and system for mobile terminal, mobile terminal and server | |
CN102984335A (en) | Identity authentication method, equipment and system for making fixed-line call |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |