CN108024018A - Anti-theft and anti-losing cell phone system, identification firmware and its application - Google Patents
Anti-theft and anti-losing cell phone system, identification firmware and its application Download PDFInfo
- Publication number
- CN108024018A CN108024018A CN201711308686.0A CN201711308686A CN108024018A CN 108024018 A CN108024018 A CN 108024018A CN 201711308686 A CN201711308686 A CN 201711308686A CN 108024018 A CN108024018 A CN 108024018A
- Authority
- CN
- China
- Prior art keywords
- mobile phone
- information
- hardware
- cloud server
- phone hardware
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/22—Processing or transfer of terminal data, e.g. status or physical capabilities
- H04W8/24—Transfer of terminal data
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Human Computer Interaction (AREA)
- Databases & Information Systems (AREA)
- Telephone Function (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
The invention discloses a kind of anti-theft and anti-losing cell phone system, identification firmware and its application, which encrypts limitation by hardware and loses mobile phone value;And exchange the contact method and identity information for picking people for by limitation loss mobile phone value.Anti-theft and anti-losing cell phone system, identification firmware and its application provided by the invention can limit the value of mobile phone loss, and facilitate owner's getting back mobile phone.
Description
Technical field
The present invention relates to technical field of mobile phones, and in particular to a kind of anti-theft and anti-losing cell phone system, identification firmware and
It is applied.
Background technology
Nowadays mobile phone and mobile equipment have become a part indispensable in people's life, in terms of anti-theft and anti-losing
Very effective protection can be played despite the presence of various safety approach but neither one scheme.
Notification number is that the Chinese patent literature of CN203250372U discloses a kind of theftproof mobile phone pendant, it is by Abseiling device
Formed with anti-stealing device for handset, the Abseiling device is made of rope a, rope b and hook, it is characterised in that:The hand
Machine anti-theft device is by antitheft mobile phone box a, antitheft mobile phone box b, magnet alarm a, magnet alarm b, magnet a, magnet b, infrared
Line receiving device and infrared control appliance are formed;The magnet alarm, infrared control appliance, infrared receiver equipment
With magnet in antitheft mobile phone box.The utility model can be good at playing by electromagnetism alarm and infrared control appliance
Antitheft mobile phone alarm and antitheft mobile phone effect, when hand-set from stolen, by using infrared control appliance, others also can not be to you
Mobile phone carry out using simple in structure, it is easy to operate, be adapted to all cellies.
Notification number is that the Chinese patent literature of CN2518269Y discloses a kind of antitheft handset case, mainly includes cell-phone cover
(2), belt fastener (3), it is characterised in that anti-thefting strip (1) is equipped with cell-phone cover, anti-thefting strip the inner (6) is connected in cell-phone cover, outside
End (5) is pierced by cell-phone cover and is detachably connected with belt fastener (3).The cell-phone cover of the patent is that a kind of design is reasonable, simple in structure, makes
With convenience, good appearance, can be effectively antitheft antitheft handset case.
The equipment of existing antitheft mobile phone can not play a role after mobile phone loss, also can not fundamentally prevent hand-set from stolen
Take.
The content of the invention
It is an object of the invention to provide a kind of anti-theft and anti-losing cell phone system, identification firmware and its application, this hair
Anti-theft and anti-losing cell phone system, identification firmware and its application of bright offer can limit the value of mobile phone after loss, and side
Just owner's getting back mobile phone.
To achieve the above object, the present invention provides a kind of anti-theft and anti-losing cell phone system, which is encrypted by hardware and limited
System loses mobile phone value;And
Exchange the contact method and identity information for picking people for by limitation loss mobile phone value.
Optionally, which includes:
Mobile phone hardware, is provided with coding;
SIM card corresponding with mobile phone hardware;
Identification firmware and cloud server, the identification firmware are used for the coding and and hand for reading mobile phone hardware
Cloud server is uploaded after the information of the corresponding SIM card of machine hardware, the cloud server is used to receive to be consolidated from identification
Verified after the coding and information of part, if passing through verification, it indicates that identification firmware starts whole mobile phone hardwares, if verification
Not by the way that then cloud server sends to replace the prompting of other SIM cards and send to identification firmware completes authentication
Invite and (be to show related prompting on the screen that identification firmware is connected and invite);The identification firmware is additionally operable to read
After the coding for taking mobile phone hardware, the information for replacing other SIM cards and authentication information (being inputted by keyboard or screen)
Cloud server is uploaded, the cloud server is used to receive the coding of the mobile phone hardware from identification firmware, replaces it
By verification after its SIM card information and authentication information, and indicate that identification firmware starts at least part mobile phone hardware.
Optionally, the mobile phone hardware includes selected from battery, camera, processor, flash lamp, Fingerprint Identification Unit, memory, raises
At least one of sound device or WiFi module.
Optionally, the cloud server, which is additionally operable to receive reporting the loss for SIM card, sends out to the identification firmware after information
Send the instruction for disabling mobile phone hardware;
The identification firmware stops after being additionally operable to the instruction of deactivation mobile phone hardware of the reception from the cloud server
Use mobile phone hardware.
The anti-lost method of antitheft mobile phone is carried out using identification firmware the present invention also provides a kind of, this method includes:
Read the coding of mobile phone hardware;
Read the information of SIM card corresponding with mobile phone hardware;
The information of the coding of read mobile phone hardware and SIM card corresponding with mobile phone hardware is uploaded to cloud service
Device;
Receive the coding of the mobile phone hardware and the information of SIM card corresponding with mobile phone hardware transmitted by cloud server
By the information of verification, enabled instruction is sent to whole mobile phone hardwares;
Receive the coding of the mobile phone hardware and the information of SIM card corresponding with mobile phone hardware transmitted by cloud server
Not verified information, and receive the prompting for the other SIM cards of replacement that cloud server is sent and send completion identity and test
The invitation of card;
Read the information of other SIM cards;
Obtain authentication information;
By the encoding of read mobile phone hardware, the information of other SIM cards and authentication information are uploaded to cloud service
Device;
Receive the encoding of the mobile phone hardware transmitted by cloud server, the information of other SIM cards and authentication letter
Breath sends enabled instruction by the information verified at least part mobile phone hardware.
Optionally, the mobile phone hardware includes selected from battery, camera, processor, flash lamp, Fingerprint Identification Unit, memory, raises
At least one of sound device or WiFi module.
Optionally, the method further includes:
Receive from finger of the cloud server because receiving the deactivation mobile phone hardware transmitted by the reporting the loss after information of SIM card
Mobile phone hardware is disabled after order.
The present invention also provides a kind of identification firmware anti-lost for antitheft mobile phone, which includes:
Read module is encoded, for reading the coding of mobile phone hardware;
First SIM card information read module, for reading the information of SIM card corresponding with mobile phone hardware;
First uploading module, for by the letter of the coding of read mobile phone hardware and SIM card corresponding with mobile phone hardware
Breath is uploaded to cloud server;
First enabled instruction sending module, for receive the mobile phone hardware transmitted by cloud server coding and with
The information of the corresponding SIM card of mobile phone hardware sends enabled instruction by the information of verification to whole mobile phone hardwares;
Verification requires module, for receiving the coding and and mobile phone hardware of the mobile phone hardware transmitted by cloud server
The not verified information of the information of corresponding SIM card, and receive the prompting for the other SIM cards of replacement that cloud server is sent
With the invitation for sending completion authentication;
Second SIM card information read module, for reading the information of other SIM cards;
Authentication information acquisition module, for obtaining authentication information;
Second uploading module, for the encoding of read mobile phone hardware, the information of other SIM cards and authentication to be believed
Breath is uploaded to cloud server;
Second enabled instruction sending module, for receive the mobile phone hardware transmitted by cloud server coding, its
The information and authentication information of its SIM card send enabled instruction by the information of verification at least part mobile phone hardware.
Optionally, the mobile phone hardware includes selected from battery, camera, processor, flash lamp, memory, Fingerprint Identification Unit, raises
At least one of sound device or WiFi module.
Optionally, the identification firmware further includes mobile phone hardware deactivation module, is taken for receiving from the high in the clouds
Business device after receiving the instruction of the deactivation mobile phone hardware transmitted by the reporting the loss after information of SIM card because disabling mobile phone hardware.
The invention has the advantages that:
(1), later value is lost by seriously limiting mobile phone, ensures to steal mobile phone and find mobile phone hardware to be not present
Value.
(2), without deactivation mobile phone completely mobile phone can be allowed there are some salvage values, certainly it is also noted that to hand-set data
Secrecy, such as memory card can be disabled, there is salvage value that the person of finding can be allowed to treat the mobile phone of oneself kindly, identity information ensures the owner of lost property
Can effective getting back mobile phone.
(3) present invention limits the value for losing mobile phone by the encrypted mode of hardware, and exchanges the person of finding for as chip
Contact method and identity information.
Brief description of the drawings
Fig. 1 is the structure diagram of one exemplary embodiment of anti-theft and anti-losing cell phone system provided by the invention.
Fig. 2 is the method one exemplary implementation anti-lost using identification firmware progress antitheft mobile phone provided by the invention
The flow diagram of example.
Fig. 3 is the structural representation of anti-lost one exemplary embodiment of identification firmware of antitheft mobile phone provided by the invention
Figure.
Embodiment
Following embodiments are used to illustrate the present invention, but are not limited to the scope of the present invention.
Fig. 1 is the structure diagram of one exemplary embodiment of anti-theft and anti-losing cell phone system provided by the invention.Such as Fig. 1 institutes
Show, which includes:
Mobile phone hardware, is provided with coding;The mobile phone hardware can be included selected from battery, camera, processor (CPU), sudden strain of a muscle
At least one of light lamp, Fingerprint Identification Unit, memory, loudspeaker or WiFi module, coding can be regular codings, i.e., each hard
Part corresponds to a coding.Bound by mobile phone hardware and handset identities, on the one hand ensure mobile phone will not by random renewal part, the
The part of two guarantee mobile phones cannot be used arbitrarily by other mobile phone, so as to limit the value for losing mobile phone.
SIM card corresponding with mobile phone hardware.
Identification firmware and cloud server, the identification firmware are used for the coding and and hand for reading mobile phone hardware
Cloud server is uploaded after the information of the corresponding SIM card of machine hardware, the cloud server is used to receive to be consolidated from identification
Verified after the coding and information of part, if passing through verification, it indicates that identification firmware starts whole mobile phone hardwares, if verification
Not by the way that then cloud server sends to replace the prompting of other SIM cards and send to identification firmware completes authentication
Invite;The identification firmware is additionally operable to the coding of reading mobile phone hardware, the information of replacement other SIM cards and identity and tests
Cloud server is uploaded after card information, the cloud server is used for the volume for receiving the mobile phone hardware from identification firmware
By verification after code, the other SIM card informations of replacement and authentication information, and indicate that identification firmware starts at least part hand
Machine hardware.The cloud server can be the coding that dynamic reads mobile phone, prevent from giving the coding of falseness, and the reading process can
To be encryption, prevent repair shop and each software developer from sending fictitious order.Such as hardware encoding is eight, first is 1, the
Two are 2 ... ... the 8th be 8, cloud server can arbitrarily read four, if correctly, represent hardware it is correct, then issue
The right to use, and cloud server needs other four setting up password (being arranged on cloud server) for being hardware, Ke Yiyou
Effect prevents from decrypting and pretends to be that, for being mutually authenticated for high in the clouds and hardware, reading every time must be to cloud server setting up password
It can be verified, mobile phone hardware can not be opened if setting up password is incorrect.Authentication is carried out when changing SIM card, such as
Fruit picks up taker and then allows access into tourist's pattern by verification, tourist's pattern can as needed to the function of part mobile phone hardware into
Row limitation, taker kind treatment mobile phone is picked up so as to allow, while owner can give and pick up the certain money reward of taker as the award given back.Test
Card process can be used only in start, and certain interval of time will verify hardware and SIM card automatically, make the right to use of mobile phone
It is maintained on cloud server.
The partial function of mobile phone is disabled after mobile phone loss for convenience, the cloud server can be also used for receiving
SIM card reports the loss the instruction for being sent to the identification firmware after information and disabling mobile phone hardware;The identification firmware is also
It can be used for after receiving the instruction from cloud server deactivation mobile phone hardware disabling at least part mobile phone hardware.So that
Mobile phone can use, but must change SIM card and could be used after carrying out authentication, and tourist's mould can be entered by picking up taker at this time
Formula, so as to facilitate the owner of lost property to look for mobile phone.
Fig. 2 is the method one exemplary implementation anti-lost using identification firmware progress antitheft mobile phone provided by the invention
The flow diagram of example.This method comprises the following steps as shown in Figure 2.
Step S1:(identification firmware) reads the coding of mobile phone hardware;The mobile phone hardware can include selected from battery,
At least one of camera, memory, processor, flash lamp, Fingerprint Identification Unit, loudspeaker or WiFi module, coding can be solid
Delimit the organizational structure code, i.e., each hardware corresponds to a coding.
Step S2:Read the information of SIM card corresponding with mobile phone hardware.
Step S3:The information of the coding of read mobile phone hardware and SIM card corresponding with mobile phone hardware is uploaded to cloud
Hold server.
Step S4:Receive the coding of the mobile phone hardware transmitted by cloud server and SIM corresponding with mobile phone hardware
The information of card sends enabled instruction by the information of verification to whole mobile phone hardwares;Above-mentioned each step can be carried out adding
It is close, so as to prevent repair shop and each software developer from just providing deceptive information and coding.
Step S5:Receive the coding of the mobile phone hardware transmitted by cloud server and SIM corresponding with mobile phone hardware
The not verified information of the information of card, and receive the prompting for the other SIM cards of replacement that cloud server is sent and sent
Into the invitation of authentication;If picking up taker takes mobile phone, due to reporting the loss for original SIM card, mobile phone hardware and original SIM card without
Method is by verification, and in order to obtain the identity information for picking up taker, then cloud server may require that picking up taker provides cell-phone number and identity
Information, thus to pick up taker carry out positioning and it is easy to find.
Step S6:Read the information of other SIM cards;
Step S7:Obtain authentication information;Authentication information is, for example, ID card No., officer's identity card and passport etc.;
Step S8:By the encoding of read mobile phone hardware, the information of other SIM cards and authentication information are uploaded to cloud
Hold server;
Step S9:Receive the encoding of the mobile phone hardware transmitted by cloud server, the information and identity of other SIM cards
Checking information sends enabled instruction by the information of verification at least part mobile phone hardware.If picking up taker provides SIM card
And authentication information, then allow access into tourist's pattern, tourist's pattern can as needed to the function of part mobile phone hardware into
Row limitation, taker kind treatment mobile phone is picked up so as to allow, while owner can give and pick up the certain money reward of taker as the award given back.
The partial function of mobile phone is disabled after mobile phone loss for convenience, the method can also include:Receive from institute
State deactivation mobile phone hardware work(after instruction of the cloud server because receiving the deactivations mobile phone hardware transmitted by the reporting the loss after information of SIM card
Energy.So that mobile phone can use, but SIM card must be changed and could be used after identity information is provided, picked up taker and need replacing
SIM card and identity information is provided could enter tourist's pattern, tourist's pattern can restricted part mobile phone hardware as needed work(
Energy.
Fig. 3 is the structural representation of anti-lost one exemplary embodiment of identification firmware of antitheft mobile phone provided by the invention
Figure.As shown in figure 3, the identification firmware includes following module.
Read module 100 is encoded, for reading the coding of mobile phone hardware;The mobile phone hardware can include selected from battery,
At least one of camera, processor, flash lamp, memory, Fingerprint Identification Unit, loudspeaker or WiFi module, coding can be solid
Delimit the organizational structure code, i.e., each hardware corresponds to a coding.
First SIM card information read module 200, for reading the information of SIM card corresponding with mobile phone hardware;
First uploading module 300, for by the coding of read mobile phone hardware and SIM card corresponding with mobile phone hardware
Information is uploaded to cloud server;
First enabled instruction sending module 400, for receiving the coding of the mobile phone hardware transmitted by cloud server
The information of SIM card corresponding with mobile phone hardware sends enabled instruction by the information of verification to whole mobile phone hardwares;
Verification requires module 500, for receiving the coding and and mobile phone of the mobile phone hardware transmitted by cloud server
The not verified information of the information of the corresponding SIM card of hardware, and receive the other SIM cards of replacement that cloud server is sent
Remind and send the invitation for completing authentication;
Second SIM card information read module 600, for reading the information of other SIM cards;
Authentication information acquisition module 700, for obtaining authentication information;
Second uploading module 800, for by the encoding of read mobile phone hardware, the information of other SIM cards and identity are tested
Card information is uploaded to cloud server;
Second enabled instruction sending module 900, for receive the mobile phone hardware transmitted by cloud server coding,
The information and authentication information of other SIM cards are sent startup at least part mobile phone hardware and are referred to by the information of verification
Order.
The partial function of mobile phone is disabled after mobile phone loss for convenience, the identification firmware can also include mobile phone
Hardware deactivation module, for receiving from the cloud server because receiving the deactivation hand transmitted by the reporting the loss after information of SIM card
Mobile phone hardware is disabled after the instruction of machine hardware.
The countermeasure of various situations is described below, but it is not thereby limiting the invention.
If after mobile phone is stolen, the owner of lost property can make up SIM card, thief can not use mobile phone because of no SIM card,
He using mobile phone to that just must use SIM card and identity information to activate at this time, and such owner of lost property is with regard to that can obtain the SIM of mobile phone at this time
Card number and identity information taken in conjunction thief require to bring back mobile phone, if thief does not give, can pass through SIM card number and identity information
Find thief and bring back mobile phone.Namely for the situation of thief, a mobile phone is stolen, oneself can not be used, to using also
The contact method and identity information of oneself must be provided, called in by the owner of lost property.No one can buy again if selling, because the right to use of mobile phone
Also in owner of lost property's hand.Sell that hardware is similarly useless even if taking away, because the hardware of mobile phone has coding, give other mobile phones also not
It can use.
If mobile phone lose found by passerby, the owner of lost property dial oneself No. SIM and the person of finding contact can, if be not desired to
Hand over that the number of changing is also still useless, the contact method of oneself can be still provided to the owner of lost property and called in by the owner of lost property, mobile phone shop is not sold yet
Go, thus it is unique it is useful be exactly to return the gratitude that the owner of lost property obtains an owner of lost property.
If mobile phone unfortunately repairs, the new accessory coding of mobile phone is changed beyond the clouds after can repairing.
Although above with general explanation and specific embodiment, the present invention is described in detail, at this
On the basis of invention, it can be made some modifications or improvements, this will be apparent to those skilled in the art.Therefore,
These modifications or improvements without departing from theon the basis of the spirit of the present invention, belong to the scope of protection of present invention.
Claims (10)
1. a kind of anti-theft and anti-losing cell phone system, it is characterised in that the system encrypts limitation by hardware and loses mobile phone value;And
Exchange the contact method and identity information for picking people for by limitation loss mobile phone value.
2. system according to claim 1, it is characterised in that the system includes:
Mobile phone hardware, is provided with coding;
SIM card corresponding with mobile phone hardware;
Identification firmware and cloud server, the identification firmware are used to reading the coding of mobile phone hardware and hard with mobile phone
Cloud server is uploaded after the information of the corresponding SIM card of part, the cloud server is used to receive from identification firmware
Verified after coding and described information, if passing through verification, it indicates that identification firmware starts whole mobile phone hardwares, if verification
Not by the way that then cloud server sends to replace the prompting of other SIM cards and send to identification firmware completes authentication
Invite;The identification firmware is additionally operable to the coding of reading mobile phone hardware, the information of replacement other SIM cards and identity and tests
Cloud server is uploaded after card information, the cloud server is used for the volume for receiving the mobile phone hardware from identification firmware
By verification after code, the other SIM card informations of replacement and authentication information, and indicate that identification firmware starts at least part hand
Machine hardware.
3. system according to claim 1, it is characterised in that the mobile phone hardware is included selected from battery, camera, processing
At least one of device, flash lamp, Fingerprint Identification Unit, memory, loudspeaker or WiFi module.
4. system according to claim 1, it is characterised in that the cloud server is additionally operable to receive reporting the loss for SIM card
The instruction for disabling mobile phone hardware is sent after information to the identification firmware;
The identification firmware disables hand after being additionally operable to the instruction of deactivation mobile phone hardware of the reception from the cloud server
Machine hardware.
5. a kind of carry out the anti-lost method of antitheft mobile phone using identification firmware, it is characterised in that this method includes:
Read the coding of mobile phone hardware;
Read the information of SIM card corresponding with mobile phone hardware;
The information of the coding of read mobile phone hardware and SIM card corresponding with mobile phone hardware is uploaded to cloud server;
Receive the coding of the mobile phone hardware transmitted by cloud server and the information of SIM card corresponding with mobile phone hardware passes through
The information of verification, enabled instruction is sent to whole mobile phone hardwares;
Receive the coding of the mobile phone hardware transmitted by cloud server and the information of SIM card corresponding with mobile phone hardware is not led to
The information of verification is crossed, and receives the prompting for the other SIM cards of replacement that cloud server is sent and sends and complete authentication
Invite;
Read the information of other SIM cards;
Obtain authentication information;
By the encoding of read mobile phone hardware, the information of other SIM cards and authentication information are uploaded to cloud server;
Receive the encoding of the mobile phone hardware transmitted by cloud server, the information of other SIM cards and authentication information are led to
The information of verification is crossed, enabled instruction is sent at least part mobile phone hardware.
6. according to the method described in claim 5, it is characterized in that, the mobile phone hardware is included selected from battery, camera, processing
At least one of device, flash lamp, Fingerprint Identification Unit, memory, loudspeaker or WiFi module.
7. according to the method described in claim 5, it is characterized in that, the method further includes:
Receive after instruction of the cloud server because receiving the deactivation mobile phone hardware transmitted by the reporting the loss after information of SIM card
Disable mobile phone hardware.
8. a kind of identification firmware anti-lost for antitheft mobile phone, it is characterised in that the identification firmware includes:
Read module is encoded, for reading the coding of mobile phone hardware;
First SIM card information read module, for reading the information of SIM card corresponding with mobile phone hardware;
First uploading module, for by the information of the coding of read mobile phone hardware and SIM card corresponding with mobile phone hardware
Reach cloud server;
First enabled instruction sending module, for receiving the coding and and mobile phone of the mobile phone hardware transmitted by cloud server
The information of the corresponding SIM card of hardware sends enabled instruction by the information of verification to whole mobile phone hardwares;
Verification requires module, for receiving the coding of the mobile phone hardware transmitted by cloud server and corresponding with mobile phone hardware
SIM card the not verified information of information, and receive prompting and the hair of the other SIM cards of replacement that cloud server is sent
Go out to complete the invitation of authentication;
Second SIM card information read module, for reading the information of other SIM cards;
Authentication information acquisition module, for obtaining authentication information;
Second uploading module, for by the encoding of read mobile phone hardware, the information and authentication information of other SIM cards
Reach cloud server;
Second enabled instruction sending module, for receiving the encoding of the mobile phone hardware transmitted by cloud server, other SIM
The information and authentication information of card send enabled instruction by the information of verification at least part mobile phone hardware.
9. identification firmware according to claim 8, it is characterised in that the mobile phone hardware is included selected from battery, phase
At least one of machine, processor, flash lamp, memory, Fingerprint Identification Unit, loudspeaker or WiFi module.
10. identification firmware according to claim 8, it is characterised in that the identification firmware further includes mobile phone
Hardware deactivation module, for receiving from the cloud server because receiving the deactivation hand transmitted by the reporting the loss after information of SIM card
Mobile phone hardware is disabled after the instruction of machine hardware.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711308686.0A CN108024018B (en) | 2017-12-11 | 2017-12-11 | Anti-theft and anti-loss mobile phone system, identity recognition firmware and application thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711308686.0A CN108024018B (en) | 2017-12-11 | 2017-12-11 | Anti-theft and anti-loss mobile phone system, identity recognition firmware and application thereof |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108024018A true CN108024018A (en) | 2018-05-11 |
CN108024018B CN108024018B (en) | 2021-06-04 |
Family
ID=62072795
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711308686.0A Active CN108024018B (en) | 2017-12-11 | 2017-12-11 | Anti-theft and anti-loss mobile phone system, identity recognition firmware and application thereof |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108024018B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109711134A (en) * | 2018-12-28 | 2019-05-03 | 中国移动通信集团江苏有限公司 | Network-based user identity anti-theft system, method, equipment and storage medium |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101414263A (en) * | 2007-10-17 | 2009-04-22 | 鸿富锦精密工业(深圳)有限公司 | Storage medium, software installation method and anti-pirate module |
US20090217054A1 (en) * | 2008-02-25 | 2009-08-27 | Cavium Networks, Inc. | Secure software and hardware association technique |
US8359008B2 (en) * | 2010-11-02 | 2013-01-22 | Hong Fu Jin Precision Industry (Shenzhen) Co., Ltd. | Security system and method for an electronic device |
CN103607697A (en) * | 2013-11-27 | 2014-02-26 | 宇龙计算机通信科技(深圳)有限公司 | Terminal anti-theft method and system based on SIM card |
CN103634477A (en) * | 2013-12-11 | 2014-03-12 | 深圳市亚略特生物识别科技有限公司 | Method and system for preventing thievery of mobile phone with fingerprint device |
CN103763108A (en) * | 2014-02-07 | 2014-04-30 | 陈子祺 | Remote system and method for recognizing unique serial number of mobile device hardware |
CN105100131A (en) * | 2014-04-25 | 2015-11-25 | 北京奇虎科技有限公司 | Terminal device and terminal device theft prevention method and system |
CN106453375A (en) * | 2016-11-04 | 2017-02-22 | 北京用友政务软件有限公司 | Smart terminal finding method and device |
-
2017
- 2017-12-11 CN CN201711308686.0A patent/CN108024018B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101414263A (en) * | 2007-10-17 | 2009-04-22 | 鸿富锦精密工业(深圳)有限公司 | Storage medium, software installation method and anti-pirate module |
US20090217054A1 (en) * | 2008-02-25 | 2009-08-27 | Cavium Networks, Inc. | Secure software and hardware association technique |
US8359008B2 (en) * | 2010-11-02 | 2013-01-22 | Hong Fu Jin Precision Industry (Shenzhen) Co., Ltd. | Security system and method for an electronic device |
CN103607697A (en) * | 2013-11-27 | 2014-02-26 | 宇龙计算机通信科技(深圳)有限公司 | Terminal anti-theft method and system based on SIM card |
CN103634477A (en) * | 2013-12-11 | 2014-03-12 | 深圳市亚略特生物识别科技有限公司 | Method and system for preventing thievery of mobile phone with fingerprint device |
CN103763108A (en) * | 2014-02-07 | 2014-04-30 | 陈子祺 | Remote system and method for recognizing unique serial number of mobile device hardware |
CN105100131A (en) * | 2014-04-25 | 2015-11-25 | 北京奇虎科技有限公司 | Terminal device and terminal device theft prevention method and system |
CN106453375A (en) * | 2016-11-04 | 2017-02-22 | 北京用友政务软件有限公司 | Smart terminal finding method and device |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109711134A (en) * | 2018-12-28 | 2019-05-03 | 中国移动通信集团江苏有限公司 | Network-based user identity anti-theft system, method, equipment and storage medium |
CN109711134B (en) * | 2018-12-28 | 2021-06-29 | 中国移动通信集团江苏有限公司 | Network-based user identity anti-theft system, method, equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN108024018B (en) | 2021-06-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8452979B2 (en) | Portable telecommunications apparatus | |
CN104521216B (en) | Authorized by portable communication equipment for user | |
CN104508674B (en) | System and device for certification user | |
US9350727B2 (en) | System and a method for validating an identification token | |
ES2257781T3 (en) | METHOD AND SYSTEM TO ENSURE THE SECURITY OF THE SUPPLY A DISTANCE FROM FINANCIAL INSTITUTIONS SERVICES. | |
CN103581378A (en) | Smart phone high in safety performance | |
WO2019010669A1 (en) | Method, apparatus and system for identity validity verification | |
Ohana et al. | Preventing cell phone intrusion and theft using biometrics | |
KR20140007250A (en) | Pairing digital system and providing method thereof | |
ES2215937T3 (en) | CALL FROM A RADIO PHONE TERMINAL. | |
CN103582184A (en) | Double-card smart phone high in safety performance | |
CN103927799A (en) | Locking system based on biometric authentication, and locking method | |
CN111159685A (en) | User account management method and device, intelligent device and storage medium | |
CN108024018A (en) | Anti-theft and anti-losing cell phone system, identification firmware and its application | |
US20190028470A1 (en) | Method For Verifying The Identity Of A Person | |
CN105631291B (en) | A kind of fingerprint authentication method and electronic equipment | |
CN101226671B (en) | Adversaria prompting method and apparatus | |
JP4852961B2 (en) | Information processing system, information processing apparatus, and information processing terminal | |
CN107451478A (en) | A kind of business economic management information security system | |
JP2005301454A (en) | User identification system and charger/radio ic chip reader | |
CN103839026B (en) | Many equipment read can encryption identity card | |
KR101226918B1 (en) | Pairing digital system and providing method thereof | |
CN106991308A (en) | Safety certifying method, apparatus and system | |
WO2018014103A1 (en) | System for provisioning, signing and verifying electronic documents, method for provisioning and signing electronic documents and method for verifying the authenticity of electronic documents | |
CN208314828U (en) | False proof device and anti-counterfeiting system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |