CN109005183A - A kind of information anti-lost method based on chip ID number and network/MAC address - Google Patents

A kind of information anti-lost method based on chip ID number and network/MAC address Download PDF

Info

Publication number
CN109005183A
CN109005183A CN201810930808.8A CN201810930808A CN109005183A CN 109005183 A CN109005183 A CN 109005183A CN 201810930808 A CN201810930808 A CN 201810930808A CN 109005183 A CN109005183 A CN 109005183A
Authority
CN
China
Prior art keywords
equipment
user
mac address
address
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810930808.8A
Other languages
Chinese (zh)
Other versions
CN109005183B (en
Inventor
周钦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Taiqin Garden Trade Co Ltd
Original Assignee
Shenzhen Taiqin Garden Trade Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Taiqin Garden Trade Co Ltd filed Critical Shenzhen Taiqin Garden Trade Co Ltd
Priority to CN201810930808.8A priority Critical patent/CN109005183B/en
Publication of CN109005183A publication Critical patent/CN109005183A/en
Application granted granted Critical
Publication of CN109005183B publication Critical patent/CN109005183B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2101/00Indexing scheme associated with group H04L61/00
    • H04L2101/60Types of network addresses
    • H04L2101/618Details of network addresses
    • H04L2101/622Layer-2 addresses, e.g. medium access control [MAC] addresses

Landscapes

  • Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Small-Scale Networks (AREA)

Abstract

The information anti-lost method based on chip ID number and MAC Address that the invention discloses a kind of, this method include extracting main control chip ID number and network control chip MAC Address and the factory step that factory data is arranged;The legal account of user's registration and by legal account information and ID number and the matched user's registration step of MAC Address;Ask the user whether to open the user equipment step of anti-lost disabling mode;The IP address of timely tracing equipment connection network, judges the use state of equipment, is effectively protected the safety of equipment and user information.

Description

A kind of information anti-lost method based on chip ID number and network/MAC address
Technical field
The invention belongs to computer security technical field, in particular to a kind of technology main control chip ID number and network MAC The information anti-lost method of location.
Background technique
With the fast development of scientific and technological level, embedded electronic product is more and more general in daily life And the anti-lost problem of information of electronic product annoyings always major embedded production piece manufacturer.Many embedded product manufacturers Great effort is put into product development process to go to realize the protection of user information, prevents user's user information due to device losses By unauthorized theft.
Such as it is disclosed in the patent application document that number of patent application is " 201510601211.5 " a kind of using movement Internet-mobile phone is looked for something anti-lost method in conjunction with Bluetooth technology, belongs to wireless communication technique field.It looks for something anti-lost method, application In including bluetooth anti-loss device, owner of lost property's terminal, the system of non-owner of lost property's terminal and server, comprising: answer bluetooth anti-loss device and terminal It is bound with APP;Owner of lost property's article is lost;Blue tooth interface broadcast radio letter is begun through with the bluetooth anti-loss device for losing article binding Breath;The information for having lost bluetooth anti-loss device is sent to server by owner of lost property's terminal;Non- owner of lost property's terminal scanning discovery Bluetooth broadcast letter Breath, discovery lose the bluetooth anti-loss device of article binding, will be found bluetooth anti-loss device information and be sent to server, server analysis If article has been stated to lose, the bluetooth anti-loss device information for notifying owner of lost property's terminal APP to be found, the bluetooth being found is anti-lost It include location information in device information.In the invention using Bluetooth technology association anti-loss device and mobile phone, user is by anti-loss device and mobile phone APP binding in terminal is realized article anti-loss, is lost searching articles with bluetooth connection channel between mobile phone and anti-loss device Function.However, the application range of bluetooth is fairly limited, for executing the bluetooth transmission means of CLASS2 standard, by power For, in the case where there is certain obstacle, Bluetooth signal can only transmit 10 meters or so, under conditions of accessible, strictly press The product of sighting target quasi- manufacture, can reach 30 meters.And executing the blue-tooth device of CLASS1 standard there is obstacle transmission range is 100 Rice, accessible linear distance is up to 300 meters, and such transmission range is whether for anti-lost more demanding or lower use Family, using effect are very unsatisfactory.
It is for another example disclosed in the patent application document that number of patent application is " 201621105430.0 " a kind of novel Multi-functional medium and long distance radio frequency anti-lose system, Multifunctional lose-preventing system is connected multiple by anti-lost terminal and with anti-lost terminal Anti-loss device composition;Anti-lost terminal is also connected with the client software for being equipped with operation anti-loss device;Anti-loss device includes at least main control module And data transmission module, the power management module, medium and long distance radio-frequency communication module, alarm being connected respectively with main control module Reminding module;Power management module includes external power interface and rechargeable battery;Anti-lost terminal passes through medium and long distance radio frequency The mode of communication and multiple anti-loss devices are connected with each other, and are carried out data transmission;Long distance in anti-lost terminal main control module and anti-loss device Networking function should all be supported from radio-frequency communication module, and it is anti-lost that anti-lost terminal can connect wherein one or more in radio-frequency region Device.The utility model completes the connection between anti-lost terminal and anti-lost client using radio-frequency technique, and still, radio-frequency technique exists Following disadvantage: firstly, the equipment connected using radio-frequency technique, manufacturing cost is generally higher, and the manufacture difficulty of radio-frequency apparatus Also universal higher.Secondly, connection is to rely on radiofrequency signal between radio-frequency apparatus, radiofrequency signal is propagated be highly prone to ring in space Border interference, finally, the privacy performance of radiofrequency signal is not high, illegal user is easy to interfere and steal the information of user.
Summary of the invention
To solve the above problems, the purpose of the present invention is to provide a kind of using the final equipment of equipment unique encodings and protects The information anti-lost method based on chip ID number MAC Address of user information.
It is another object of the present invention to provide a kind of information anti-lost method based on chip id and MAC Address, the party Method safe ready, convenient for operation, suitable for being widely popularized.
To achieve the above object, technical scheme is as follows:
The present invention provides a kind of information anti-lost method based on chip ID number and MAC Address, and this method includes following step It is rapid:
S1: factory: system software reads the MAC of network chip in the unique ID number and equipment of main control chip in equipment The ID number and MAC Address are saved on distal end or other servers by location by network, and the general including ID number and MAC Address All data initializations are software configuration state;
S2: user's registration: after user obtains this equipment by legitimate channels, user is legal use by network registry The ID number of this equipment and MAC Address are uploaded by network, are matched with legitimate user's account with activation equipment by family, system software, Cloud or its data server match the corresponding ID number of equipment with MAC Address with account information, and modify this cloud device number According to for user's state of activation;
S3: user setting: system software asks the user whether to open the anti-lost tracking of equipment automatically;
S4: judge user's use state: equipment normal use simultaneously connects network, and equipment reads IP address by MAC Address, The IP address is identical as the last time connection IP address of network, then judges that equipment is in normal operating condition, equipment enters normal Use pattern M1;Equipment connects network, and equipment reads IP address by MAC Address, the IP address and upper one of this connection network The IP address of secondary connection network is different, then judges that equipment is in abnormal using state, equipment enters abnormal use pattern M2;As closed Method user confirms that equipment has been lost, and gives application for change by cloud or the sending of other servers, then judges that equipment is in and lose State, equipment are transferred to missing mode M3;As equipment chip ID number and MAC Address at least one change, then judge Equipment is in service mode, and equipment is transferred to maintenance mode M4.
Main control chip is all had in smart machine, in the world, each main control chip has its unique ID number, and The ID number of each main control chip can not be changed.And also equipment has network-control core in the smart machine of each access network Piece, each network control chip also has unique mac address, and the MAC Address of each network control chip can not also be changed, Before factory, the MAC Address of the ID number of main control chip and network control chip is uploaded to cloud or other services by system software In device, the ID number of equipment and MAC Address is called to prepare for subsequent user.After user obtains equipment by legal means, utilize Cloud or other server registrations be legitimate user, cloud or other servers by the account of legitimate user and equipment ID number and MAC Address matches activation equipment, and equipment can be used normally in user since then.In use, system software, which reads equipment, connects network IP, and user's use state is judged according to the IP, according to the different use state real-time tracing equipment dynamic of user, protection is used Family information.
Further, it includes for following subprocessing step that equipment, which enters normal use mode M1: M11: equipment normal use And network is connected, equipment reads IP address by MAC Address;
M12: the IP address is identical as the last time connection IP address of network;
M14: the IP address of this connection network, more new equipment link information are sent to cloud or other servers from the background. When active user connects network, IP address is consistent with IP address when last connection network, then determines that it is normal use shape State, facility information are normally opened to active user, and active user can normal use this equipment.
Further, it includes following subprocessing step that equipment, which enters abnormal use pattern M2:
M21: equipment connects network, and equipment reads IP address by MAC Address;
M22: the IP address of this connection network is different from the last time connection IP address of network;
M23: the IP address of this connection network is uploaded to cloud or other servers by system software, while backstage is wanted Information is when active user being asked to input registration to verify user identity;
M24: judge whether the check information of active user's input is accurate, and success is verified if accurate, allows active user Normal use, equipment is transferred to missing mode M3 if inaccuracy.When active user connects network, IP address connect net with the last time IP address when network is inconsistent, then is determined as that non-normal use state, system report the exception use information and require current use Family verifies identity, if active user inputs correct check information, then regards as original annotation volume user, record current IP address and on The information is reported, facility information opens to active user, if active user can not input correct check information, is then determined as Illegal user, opening of device missing mode facilitate legitimate user to inquire the IP of illegal user by cloud or other servers, Effective tracing equipment.
Further, it includes following subprocessing step that equipment, which is transferred to missing mode M3:
M31: locking device forbids active user's access equipment information;
M32: system software reports and submits the IP address of active user's connection network by cloud or other servers;
M33: system software sends warning message to legitimate user by cloud or other servers.Equipment enters loss mould After formula, equipment locking forbids active user to access user information, prevents active user from stealing the account information of legitimate user, into One step, system software uploads the IP address of current operation, and legitimate user is facilitated to inquire and chase after by cloud or other servers Track equipment, system are also alarmed to legitimate user, are reminded legitimate user to pay attention to all devices safety, are guarded against equipment and personal information quilt It steals.
Further, it includes following subprocessing step that equipment, which is transferred to maintenance mode M4:
M41: system software detects current ID number and MAC Address, and such as only ID number changes, then is transferred to M42;Such as only MAC Address changes, then is transferred to M43;If ID number changes with MAC Address, then M44 is transferred to;
M42: current ID number is uploaded to data column request verification identical with MAC Address by system software, and system software will It is required that user inputs the number of registration of legitimate user, if inputting legal and unsuccessful verification, new ID number will upload again and MAC The identical data column in address and more new data;Otherwise, this equipment will be transferred to missing mode M3;
M43: current MAC address is uploaded data column request verification identical with ID number by system software, will require user's weight The number of registration of new input legitimate user, if inputting legal and unsuccessful verification, new MAC Address will upload and ID number phase again Same data arrange and more new data;Otherwise, this equipment will enter missing mode M3;
No. M44:ID will change simultaneously with MAC, and after equipment is connected to network again, this equipment will enter missing mode M3, User re-enters the registration information of former legitimate user, if inputting legal and unsuccessful verification, new ID number and MAC Address will Again it uploads and the data of user's registration column and more new data;Otherwise, this equipment will be automatically into missing mode M3.Main control chip Or network control chip is impaired, user needs to change or repairs main control chip and network control chip, after the completion of maintenance, equipment pair The ID number for the main control chip answered or the MAC Address of network control chip will change, such as only one change, then only need by The data to change upload and request to verify, and verifying can successfully assert again, and such as the two changes, then require former conjunction Method user re-registers account information, and completing registration can normal use.
Present invention has an advantage that compared with the prior art, in the present invention, equipment uploads unique ID of main control chip Number and network control chip unique mac address, ID number is matched with MAC Address with the account of user's lawful registration, in user During using equipment, system software confirms that equipment connects the IP address of network, real-time tracing equipment by MAC Address in time Position, while guaranteeing normal equipment, legal use, avoid equipment stolen, prevent user information from losing.
Detailed description of the invention
Fig. 1 is the flow chart of the information anti-lost method the present invention is based on chip ID number and MAC Address.
Fig. 2 is that the present invention is based on normal use mode M1 in chip ID number and the information anti-lost method of MAC Address Subprocessing flow chart of steps.
Fig. 3 is that the present invention is based on use pattern M2 abnormal in chip ID number and the information anti-lost method of MAC Address Subprocessing flow chart of steps.
Fig. 4 is that the present invention is based at the son of missing mode M3 in chip ID number and the information anti-lost method of MAC Address Manage flow chart of steps.
Fig. 5 is that the present invention is based at the son of maintenance mode M4 in chip ID number and the information anti-lost method of MAC Address Manage flow chart of steps.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to the accompanying drawings and embodiments, right The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and It is not used in the restriction present invention.
To achieve the above object, technical scheme is as follows:
Referring to shown in Fig. 1-2, the present invention provides a kind of information anti-lost method based on chip ID number and MAC Address, the party Method includes following steps:
S1: factory: system software reads the MAC of network chip in the unique ID number and equipment of main control chip in equipment The ID number and MAC Address are saved on distal end or other servers by location by network, and the general including ID number and MAC Address All data initializations are software configuration state;
S2: user's registration: after user obtains this equipment by legitimate channels, user is legal use by network registry The ID number of this equipment and MAC Address are uploaded by network, are matched with legitimate user's account with activation equipment by family, system software, Cloud or its data server match the corresponding ID number of equipment with MAC Address with account information, and modify this cloud device number According to for user's state of activation;
S3: user setting: system software asks the user whether to open the anti-lost tracking of equipment automatically;
S4: judge user's use state: equipment normal use simultaneously connects network, and equipment reads IP address by MAC Address, The IP address is identical as the last time connection IP address of network, then judges that equipment is in normal operating condition, equipment enters normal Use pattern M1;Equipment connects network, and equipment reads IP address by MAC Address, the IP address and upper one of this connection network The IP address of secondary connection network is different, then judges that equipment is in abnormal using state, equipment enters abnormal use pattern M2;As closed Method user confirms that equipment has been lost, and gives application for change by cloud or the sending of other servers, then judges that equipment is in and lose State, equipment are transferred to missing mode M3;As equipment chip ID number and MAC Address at least one change, then judge Equipment is in service mode, and equipment is transferred to maintenance mode M4.
Main control chip is all had in smart machine, in the world, each main control chip has its unique ID number, and The ID number of each main control chip can not be changed.And also equipment has network-control core in the smart machine of each access network Piece, each network control chip also has unique mac address, and the MAC Address of each network control chip can not also be changed, Before factory, the MAC Address of the ID number of main control chip and network control chip is uploaded to cloud or other services by system software In device, the ID number of equipment and MAC Address is called to prepare for subsequent user.After user obtains equipment by legal means, utilize Cloud or other server registrations be legitimate user, cloud or other servers by the account of legitimate user and equipment ID number and MAC Address matches activation equipment, and equipment can be used normally in user since then.In use, system software, which reads equipment, connects network IP, and user's use state is judged according to the IP, according to the different use state real-time tracing equipment dynamic of user, protection is used Family information.
Further, it includes for following subprocessing step that equipment, which enters normal use mode M1: M11: equipment normal use And network is connected, equipment reads IP address by MAC Address;
M12: the IP address is identical as the last time connection IP address of network;
M14: the IP address of this connection network, more new equipment link information are sent to cloud or other servers from the background. When active user connects network, IP address is consistent with IP address when last connection network, then determines that it is normal use shape State, facility information are normally opened to active user, and active user can normal use this equipment.
Further, it includes following subprocessing step that equipment, which enters abnormal use pattern M2:
M21: equipment connects network, and equipment reads IP address by MAC Address;
M22: the IP address of this connection network is different from the last time connection IP address of network;
M23: the IP address of this connection network is uploaded to cloud or other servers by system software, while backstage is wanted Information is when active user being asked to input registration to verify user identity;
M24: judge whether the check information of active user's input is accurate, and success is verified if accurate, allows active user Normal use, equipment is transferred to missing mode M3 if inaccuracy.When active user connects network, IP address connect net with the last time IP address when network is inconsistent, then is determined as that non-normal use state, system report the exception use information and require current use Family verifies identity, if active user inputs correct check information, then regards as original annotation volume user, record current IP address and on The information is reported, facility information opens to active user, if active user can not input correct check information, is then determined as Illegal user, opening of device missing mode facilitate legitimate user to inquire the IP of illegal user by cloud or other servers, Effective tracing equipment.
Further, it includes following subprocessing step that equipment, which is transferred to missing mode M3:
M31: locking device forbids active user's access equipment information;
M32: system software reports and submits the IP address of active user's connection network by cloud or other servers;
M33: system software sends warning message to legitimate user by cloud or other servers.Equipment enters loss mould After formula, equipment locking forbids active user to access user information, prevents active user from stealing the account information of legitimate user, into One step, system software uploads the IP address of current operation, and legitimate user is facilitated to inquire and chase after by cloud or other servers Track equipment, system are also alarmed to legitimate user, are reminded legitimate user to pay attention to all devices safety, are guarded against equipment and personal information quilt It steals.
Further, it includes following subprocessing step that equipment, which is transferred to maintenance mode M4:
M41: system software detects current ID number and MAC Address, and such as only ID number changes, then is transferred to M42;Such as only MAC Address changes, then is transferred to M43;If ID number changes with MAC Address, then M44 is transferred to;
M42: current ID number is uploaded to data column request verification identical with MAC Address by system software, and system software will It is required that user inputs the number of registration of legitimate user, if inputting legal and unsuccessful verification, new ID number will upload again and MAC The identical data column in address and more new data;Otherwise, this equipment will be transferred to missing mode M3;
M43: current MAC address is uploaded data column request verification identical with ID number by system software, will require user's weight The number of registration of new input legitimate user, if inputting legal and unsuccessful verification, new MAC Address will upload and ID number phase again Same data arrange and more new data;Otherwise, this equipment will enter missing mode M3;
No. M44:ID will change simultaneously with MAC, and after equipment is connected to network again, this equipment will enter missing mode M3, User re-enters the registration information of former legitimate user, if inputting legal and unsuccessful verification, new ID number and MAC Address will Again it uploads and the data of user's registration column and more new data;Otherwise, this equipment will be automatically into missing mode M3.Main control chip Or network control chip is impaired, user needs to change or repairs main control chip and network control chip, after the completion of maintenance, equipment pair The ID number for the main control chip answered or the MAC Address of network control chip will change, such as only one change, then only need by The data to change upload and request to verify, and verifying can successfully assert again, and such as the two changes, then require former conjunction Method user re-registers account information, and completing registration can normal use.
Present invention has an advantage that compared with the prior art, in the present invention, equipment uploads unique ID of main control chip Number and network control chip unique mac address, ID number is matched with MAC Address with the account of user's lawful registration, in user During using equipment, system software confirms that equipment connects the IP address of network, real-time tracing equipment by MAC Address in time Position, while guaranteeing normal equipment, legal use, avoid equipment stolen, prevent user information from losing.
The above is merely preferred embodiments of the present invention, be not intended to limit the invention, it is all in spirit of the invention and Made any modifications, equivalent replacements, and improvements etc., should all be included in the protection scope of the present invention within principle.

Claims (5)

1. a kind of information anti-lost method based on chip ID number and MAC Address, which is characterized in that this method includes following step It is rapid:
S1: factory: system software reads the MAC Address of network chip in the unique ID number and equipment of main control chip in equipment, will The ID number and MAC Address are saved on distal end or other servers by network, and including ID number and MAC Address by all numbers According to being initialized as software configuration state;
S2: user's registration: after user obtains this equipment by legitimate channels, user is legitimate user by network registry, is Unite software by the ID number of this equipment and MAC Address by network upload, matched with legitimate user's account with activation equipment, cloud or Its data server matches the corresponding ID number of equipment with MAC Address with account information, and modifies this cloud device data to use Family state of activation;
S3: user setting: system software asks the user whether to open the anti-lost tracking of equipment automatically;
S4: judge user's use state and switch mode: equipment normal use simultaneously connects network, and equipment is read by MAC Address IP address, the IP address is identical as the last time connection IP address of network, then judges that equipment is in normal operating condition, equipment into Enter normal use mode M1;Equipment connects network, and equipment reads IP address by MAC Address, the IP address of this connection network It is different from the last time connection IP address of network, then judge that equipment is in abnormal using state, equipment enters abnormal use pattern M2;As legitimate user confirm equipment lost, and by cloud or other servers sending give application for change, then judge at equipment In lost condition, equipment is transferred to missing mode M3;As equipment chip ID number and MAC Address at least one change, Then judge that equipment is in service mode, equipment is transferred to maintenance mode M4.
2. the information anti-lost method based on chip ID number and MAC Address as described in claim 1, which is characterized in that described to set The standby normal use mode M1 that enters includes for following subprocessing step: M11: equipment normal use simultaneously connects network, and equipment passes through MAC Address reads IP address;
M12: the IP address is identical as the last time connection IP address of network;
M14: the IP address of this connection network, more new equipment link information are sent to cloud or other servers from the background.
3. the information anti-lost method based on chip ID number and MAC Address as described in claim 1, which is characterized in that described to set The standby exception use pattern M2 that enters includes following subprocessing step:
M21: equipment connects network, and equipment reads IP address by MAC Address;
M22: the IP address of this connection network is different from the last time connection IP address of network;
M23: the IP address of this connection network is uploaded to cloud or other servers by system software, while backstage requires to work as Information is when preceding user inputs registration to verify user identity;
M24: judge whether the check information of active user's input is accurate, and success is verified if accurate, allows active user normal It uses, equipment is transferred to missing mode M3 if inaccuracy.
4. the information anti-lost method based on chip ID number and MAC Address as described in claim 1, which is characterized in that described to set Include following subprocessing step for missing mode M3 is transferred to:
M31: locking device forbids active user's access equipment information;
M32: system software reports and submits the IP address of active user's connection network by cloud or other servers;
M33: system software sends warning message to legitimate user by cloud or other servers.
5. the information anti-lost method based on chip ID number and MAC Address as described in claim 1, which is characterized in that described to set Include following subprocessing step for maintenance mode M4 is transferred to:
M41: system software detects current ID number and MAC Address, and such as only ID number changes, then is transferred to M42;Such as only MAC Address It changes, is then transferred to M43;If ID number changes with MAC Address, then M44 is transferred to;
M42: current ID number is uploaded to data column request verification identical with MAC Address by system software, and system software will require User inputs the number of registration of legitimate user, if inputting legal and unsuccessful verification, new ID number will upload again and MAC Address Identical data column and more new data;Otherwise, this equipment will be transferred to missing mode M3;
M43: current MAC address is uploaded data column request verification identical with ID number by system software, and user will be required again defeated Enter the number of registration of legitimate user, if inputting legal and unsuccessful verification, new MAC Address will upload identical with ID number again Data column and more new data;Otherwise, this equipment will enter missing mode M3;
No. M44:ID will change simultaneously with MAC, and after equipment is connected to network again, this equipment will enter missing mode M3, user The registration information of former legitimate user is re-entered, if inputting legal and unsuccessful verification, new ID number and MAC Address will be again It uploads and the data of user's registration column and more new data;Otherwise, this equipment will be automatically into missing mode M3.
CN201810930808.8A 2018-08-15 2018-08-15 Information anti-loss method based on chip ID number and network MAC address Active CN109005183B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810930808.8A CN109005183B (en) 2018-08-15 2018-08-15 Information anti-loss method based on chip ID number and network MAC address

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810930808.8A CN109005183B (en) 2018-08-15 2018-08-15 Information anti-loss method based on chip ID number and network MAC address

Publications (2)

Publication Number Publication Date
CN109005183A true CN109005183A (en) 2018-12-14
CN109005183B CN109005183B (en) 2020-10-09

Family

ID=64592783

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810930808.8A Active CN109005183B (en) 2018-08-15 2018-08-15 Information anti-loss method based on chip ID number and network MAC address

Country Status (1)

Country Link
CN (1) CN109005183B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101198119A (en) * 2006-12-09 2008-06-11 北京三星通信技术研究有限公司 Automatic loss reporting method and portable terminal using the same
CN102780989A (en) * 2012-07-06 2012-11-14 北京小米科技有限责任公司 Method and system for preventing loss of mobile terminal
CN103347131A (en) * 2013-07-05 2013-10-09 张�林 Intelligent mobile phone anti-theft method and system
CN104066050A (en) * 2014-06-12 2014-09-24 可牛网络技术(北京)有限公司 Method for preventing communication terminal from getting lost, communication terminal and server
CN104219317A (en) * 2014-09-15 2014-12-17 浙江云微览网络科技股份有限公司 Router, system and method for anti-theft tracking for mobile terminal on basis of location positioning
CN105100131A (en) * 2014-04-25 2015-11-25 北京奇虎科技有限公司 Terminal device and terminal device theft prevention method and system
CN105100130A (en) * 2014-04-25 2015-11-25 北京奇虎科技有限公司 Terminal device and terminal device theft prevention method and system
CN105635488A (en) * 2016-03-17 2016-06-01 广东欧珀移动通信有限公司 Mobile terminal antitheft processing method and device
CN105825157A (en) * 2016-05-16 2016-08-03 西安莫贝克半导体科技有限公司 Mobile memory with tracking function and tracking and finding method

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101198119A (en) * 2006-12-09 2008-06-11 北京三星通信技术研究有限公司 Automatic loss reporting method and portable terminal using the same
CN102780989A (en) * 2012-07-06 2012-11-14 北京小米科技有限责任公司 Method and system for preventing loss of mobile terminal
CN103347131A (en) * 2013-07-05 2013-10-09 张�林 Intelligent mobile phone anti-theft method and system
CN105100131A (en) * 2014-04-25 2015-11-25 北京奇虎科技有限公司 Terminal device and terminal device theft prevention method and system
CN105100130A (en) * 2014-04-25 2015-11-25 北京奇虎科技有限公司 Terminal device and terminal device theft prevention method and system
CN104066050A (en) * 2014-06-12 2014-09-24 可牛网络技术(北京)有限公司 Method for preventing communication terminal from getting lost, communication terminal and server
CN104219317A (en) * 2014-09-15 2014-12-17 浙江云微览网络科技股份有限公司 Router, system and method for anti-theft tracking for mobile terminal on basis of location positioning
CN105635488A (en) * 2016-03-17 2016-06-01 广东欧珀移动通信有限公司 Mobile terminal antitheft processing method and device
CN105825157A (en) * 2016-05-16 2016-08-03 西安莫贝克半导体科技有限公司 Mobile memory with tracking function and tracking and finding method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
王德磊: "手机丢失防护系统设计与实现", 《福建电脑》 *

Also Published As

Publication number Publication date
CN109005183B (en) 2020-10-09

Similar Documents

Publication Publication Date Title
US10231123B2 (en) Bluetooth low energy (BLE) communication between a mobile device and a vehicle
EP3328691B1 (en) Apparatuses, methods, and computer programs for establishing a radio connection on the basis of proximity information
EP2640105B1 (en) Method, device and system for unlocking mobile terminal by operator
KR101536489B1 (en) Authentication of access terminal identities in roaming networks
FI101584B (en) Check your mobile subscriber ID
CN1327663C (en) Method of user access radio communication network and radio network cut in control device
KR102219756B1 (en) Method for managing the state of connected devices
JP2000504156A (en) Management of authentication key in mobile communication system
CN104050742A (en) Intelligent door and control method and system thereof
CN105376293A (en) Method and system for a key fob base station enabling remote car access using a nomadic device
EP2384038B1 (en) Method and system for realizing network locking and unlocking by a terminal device
CN104080658A (en) Vehicle remote operation information provision device, vehicle-mounted remote operation information acquisition device, and vehicle remote operation system comprising these devices
MX2007014276A (en) Method for disabling a mobile device.
CN106488453A (en) A kind of method and system of portal certification
CN102833066A (en) Three-party authentication method and device as well as intelligent card supporting two-way authentication
JP3829803B2 (en) Set up calls from mobile radiotelephone terminals with biometric authentication
CN101945371A (en) Communication equipment and control method thereof
CN101091378A (en) Method of authentication of a mobile communications terminal in a visited network
US20170301167A1 (en) Secure vehicle access method and system
CN107845172A (en) A kind of smart lock security system and method for work with autonomous classification ability
CN106790078A (en) Safety communicating method and device between a kind of SDK and electronic certificate system
KR101375946B1 (en) Smart key genenating system by using mobile and method of thesame
CN100512111C (en) The method for realizing WAPI-based WLAN operation via the classified terminal certificate
CN102158856A (en) Mobile terminal identification code authentication system and method, server and terminal
CN110611913B (en) Wireless network access method, system management platform and access system for nuclear power plant

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP02 Change in the address of a patent holder

Address after: 518000 907d6, block B, phase I, Tian'an innovation and Technology Plaza, No. 25, Tairan 4th Road, Tian'an community, Shatou street, Futian District, Shenzhen City, Guangdong Province

Patentee after: SHENZHEN TAIQINYUAN TRADE Co.,Ltd.

Address before: 518000 702, unit 1, unit 1-3, building 1, wenle garden, Haifu community, Xin'an street, Bao'an District, Shenzhen City, Guangdong Province

Patentee before: SHENZHEN TAIQINYUAN TRADE Co.,Ltd.

CP02 Change in the address of a patent holder
CP02 Change in the address of a patent holder

Address after: 518000 business building 8410, Xixiang Innovation Park, Qianmu property, guxing community, Xixiang street, Bao'an District, Shenzhen City, Guangdong Province

Patentee after: SHENZHEN TAIQINYUAN TRADE Co.,Ltd.

Address before: 518000 907d6, block B, phase I, Tian'an innovation and Technology Plaza, No. 25, Tairan 4th Road, Tian'an community, Shatou street, Futian District, Shenzhen City, Guangdong Province

Patentee before: SHENZHEN TAIQINYUAN TRADE Co.,Ltd.

CP02 Change in the address of a patent holder