CN112600923A - Mobile phone data retrieving method and system - Google Patents

Mobile phone data retrieving method and system Download PDF

Info

Publication number
CN112600923A
CN112600923A CN202011473612.4A CN202011473612A CN112600923A CN 112600923 A CN112600923 A CN 112600923A CN 202011473612 A CN202011473612 A CN 202011473612A CN 112600923 A CN112600923 A CN 112600923A
Authority
CN
China
Prior art keywords
mobile phone
internet
things equipment
cloud server
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011473612.4A
Other languages
Chinese (zh)
Other versions
CN112600923B (en
Inventor
邵兵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Duba Network Technology Co ltd
Original Assignee
Hangzhou Duba Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Duba Network Technology Co ltd filed Critical Hangzhou Duba Network Technology Co ltd
Priority to CN202011473612.4A priority Critical patent/CN112600923B/en
Publication of CN112600923A publication Critical patent/CN112600923A/en
Application granted granted Critical
Publication of CN112600923B publication Critical patent/CN112600923B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/141Setup of application sessions

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The application relates to a method and a system for retrieving mobile phone data, which are used for monitoring the current IP address of a mobile phone through Internet of things equipment and judging whether the mobile phone is lost or not. By judging whether the communication feedback message returned by the lost mobile phone can be received or not, the mobile phone can be judged to be in the on-off state. The operation page is put on any plane through the projection module, and then the cloud server is logged in through the operation page, so that data transfer can be carried out on the lost mobile phone through the cloud server at any time and any place, the operation is simple, the mobile phone does not need to be backed up, and all data in the lost mobile phone can be found back in percentage.

Description

Mobile phone data retrieving method and system
Technical Field
The application relates to the technical field of smart phones, in particular to a method and a system for retrieving mobile phone data.
Background
With the development of mobile phone technology, smart phones have become increasingly popular. Smart phones not only have their own large capacity memory, but some also support extended various types of mobile phone memory cards, such as T-Flash cards, so smart phones can store a large amount of user data, such as phone books, pictures, audio and video files, documents, personal information, schedules, itineraries, and the like. Along with the increasing powerful functions of the mobile phone, the dependence degree of a user on the mobile phone is also gradually improved, and much information which is very important for the user is stored in the mobile phone, so that the method is really convenient, but brings about many hidden dangers. Once the mobile phone is lost, various important information in the mobile phone cannot be retrieved, great inconvenience is brought to work and life, and more seriously, some personal privacy information can be utilized by other useful people to earn illegal benefits. Therefore, once the mobile phone is lost, the mobile phone data cannot be retrieved.
In a conventional mobile phone data retrieving method, generally, a standby mobile phone is prepared in advance, and data is backed up in a cloud server to retrieve the data. When the mobile phone is lost, the cloud server acquires backup data, and sends an instruction or a short message to the lost mobile phone through the backup mobile phone to lock the lost mobile phone, so that the lost mobile phone cannot browse the data of the lost mobile phone.
However, the conventional method for retrieving the data of the mobile phone has many disadvantages, namely firstly, the operation is complicated, and secondly, once the mobile phone is lost and is powered off or damaged, the mobile phone cannot communicate with a backup mobile phone. The most serious drawback is that complete retrieval of the data cannot be achieved. The backup data of the cloud server is not backed up in real time but is backed up periodically, so that the data of the cloud server cannot be guaranteed to be up-to-date, namely, the data of the lost mobile phone cannot be guaranteed to be completely consistent. Therefore, a method which is simple to operate and can retrieve lost mobile phone data by a hundred percent is lacked at present.
Disclosure of Invention
Therefore, it is necessary to provide a method and a system for retrieving mobile phone data, aiming at the problems that the conventional mobile phone data retrieving method is complicated in operation and cannot retrieve lost mobile phone data in a hundred percent.
The application provides a mobile phone data retrieving method, which comprises the following steps:
the method comprises the steps that the Internet of things equipment obtains a current IP address of a mobile phone and judges whether the current IP address is consistent with an IP address in a secret protocol or not;
if the current IP address of the mobile phone is inconsistent with the IP address in the privacy protocol, the Internet of things equipment marks the mobile phone as a lost mobile phone and displays alarm information through a display module;
the Internet of things equipment sends a communication establishing instruction to the lost mobile phone;
the Internet of things equipment judges whether a communication feedback message returned by the lost mobile phone is received or not;
if a communication feedback message returned by the lost mobile phone is received, the Internet of things equipment sends a locking instruction to the lost mobile phone so that the lost mobile phone enters a locking state;
the Internet of things equipment puts an operation page on any plane through a projection module;
the Internet of things equipment logs in the cloud server through the operation page, and all data in the lost mobile phone are imported into the cloud server through the cloud server.
Further, after the internet of things device imports all data in the lost mobile phone into the cloud server through the cloud server, the method further includes:
the Internet of things equipment sends a data clearing instruction to the cloud server through the operation page, so that the cloud server forwards the data clearing instruction to the lost mobile phone, and the data clearing instruction is used for deleting all data in the lost mobile phone.
Further, after the internet of things device determines whether a communication feedback message returned by the lost mobile phone is received, the method further includes:
if the communication feedback message returned by the lost mobile phone is not received, the Internet of things equipment puts the operation page on any plane through the projection module;
the Internet of things equipment logs in the cloud server through the operation page, and sends a locking instruction, a data clearing instruction and a clock signal to the cloud server through the operation page, so that the cloud server sends the locking instruction and the data clearing instruction to the lost mobile phone once every other preset time period, and when the lost mobile phone is started, the lost mobile phone automatically enters a locking state and clears all data.
Further, after the internet of things device determines whether a communication feedback message returned by the lost mobile phone is received, the method further includes:
if the communication feedback message returned by the lost mobile phone is not received, the Internet of things equipment puts the operation page on any plane through the projection module;
the Internet of things equipment logs in a cloud server through an operation page, acquires the starting state of the lost mobile phone through the cloud server, and judges whether the lost mobile phone is in the starting state or not;
if the lost mobile phone is in a starting state, the Internet of things equipment sends a locking instruction to the lost mobile phone so that the lost mobile phone enters a locking state;
the method comprises the steps that the Internet of things equipment acquires a first time node of a lost mobile phone in a starting state and acquires a second time node of the Internet of things equipment which sends a communication establishing instruction to the lost mobile phone;
the Internet of things equipment calculates the difference value between the first time node and the second time node to obtain the mobile phone loss time, and judges whether the mobile phone loss time is greater than the regular backup time or not;
if the mobile phone loss time is greater than the regular backup time, the Internet of things equipment sends a backup instruction to the cloud server through the operation page, and the backup instruction is used for the cloud server to export all data in the lost mobile phone and store the data in the cloud server;
the method comprises the steps that the Internet of things equipment sends a data clearing instruction to a cloud server through an operation page, so that the cloud server forwards the data clearing instruction to a lost mobile phone, and the data clearing instruction is used for deleting all data in the lost mobile phone;
and if the lost mobile phone is in the power-off state, returning to the step of acquiring the power-on state of the lost mobile phone and judging whether the lost mobile phone is in the power-on state.
Further, after determining whether the mobile phone loss time is greater than the periodic backup time, the method further includes:
if the mobile phone loss time is less than or equal to the periodic backup time, the step S537 is directly executed.
Further, the step of logging in the cloud server through the operation page comprises the following steps:
the method comprises the steps that the Internet of things equipment sends a communication request instruction to a cloud server;
the method comprises the steps that the Internet of things equipment verifies identity information of the Internet of things equipment through an operation page, and the identity information is verified in a password verification or face recognition mode;
after the identity information is verified, the Internet of things equipment and the cloud server establish a communication link relation.
Further, before the internet of things device acquires the current IP address of the mobile phone and determines whether the current IP address is consistent with the IP address in the privacy protocol, the method further includes:
acquiring an Internet of things equipment ID and a communication protocol in a local database, and judging whether the Internet of things equipment ID is bound with the mobile phone according to the communication protocol;
if the Internet of things equipment ID is not bound with the mobile phone, sending a first binding instruction to the mobile phone, wherein the first binding instruction is used for establishing a communication link relation between the mobile phone and the Internet of things equipment and generating a communication protocol;
and receiving a communication protocol returned by the mobile phone.
Further, after the internet of things device sends the first binding instruction to the mobile phone, the method further includes:
the method comprises the steps that the Internet of things equipment sends a communication request instruction to a cloud server;
the method comprises the steps that the Internet of things equipment verifies identity information of the Internet of things equipment through an operation page, and the identity information is verified in a password verification or face recognition mode;
after the identity information is verified, the Internet of things equipment and the cloud server establish a communication link relation;
the Internet of things equipment sends a second binding instruction to the cloud server, and the second binding instruction is used for establishing a binding relationship among the mobile phone, the local equipment and a cloud account of the cloud server, generating binding data and storing the binding data in the cloud server.
The application also provides a system for retrieving mobile phone data, which comprises:
the Internet of things equipment is used for executing the mobile phone data retrieving method;
the mobile phone is in communication connection with the Internet of things equipment;
and the cloud server is in communication connection with the mobile phone and the Internet of things equipment respectively.
Further, the internet of things equipment includes:
a processor;
a projection module electrically connected to the processor;
the Internet of things equipment communication module is electrically connected with the processor; the internet of things equipment communication module is further in communication connection with the mobile phone and the cloud server respectively.
The application relates to a method and a system for retrieving mobile phone data, which are used for monitoring the current IP address of a mobile phone through Internet of things equipment and judging whether the mobile phone is lost or not. By judging whether the communication feedback message returned by the lost mobile phone can be received or not, the mobile phone can be judged to be in the on-off state. The operation page is put on any plane through the projection module, and then the cloud server is logged in through the operation page, so that data transfer can be carried out on the lost mobile phone through the cloud server at any time and any place, the operation is simple, the mobile phone does not need to be backed up, and all data in the lost mobile phone can be found back in percentage.
Drawings
Fig. 1 is a schematic flow chart illustrating a method for retrieving mobile phone data according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of a mobile phone data retrieving system according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of an internet of things device in a mobile phone data retrieval system according to an embodiment of the present application.
Reference numerals:
10-internet of things equipment; 110-a processor; 120-a projection module; 130-an internet of things device communication module;
20-a mobile phone; 30-cloud server
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
The application provides a mobile phone data retrieving method. It should be noted that the method for retrieving data of a mobile phone provided by the present application is applicable to any brand and type of mobile phones.
In addition, the mobile phone data retrieving method provided by the application is not limited to the execution main body. Optionally, an executive body of the mobile phone data retrieving method provided by the application can be an internet of things device. Specifically, an execution main body of the mobile phone data retrieving method provided by the application can be one or more processors in the internet of things device.
As shown in fig. 1, in an embodiment of the present application, the method includes the following steps S100 to S513:
s100, the Internet of things equipment acquires the current IP address of the mobile phone and judges whether the current IP address is consistent with the IP address in the privacy protocol.
Specifically, the internet of things device may obtain a current IP address of the mobile phone. The current IP address is related to the geographic location of the handset. For example, when the mobile phone is in Beijing, the IP address is randomly distributed by a base station set by a Beijing operator in Beijing.
The security protocol stores user identity information, which may include the IP addresses of one or more regions where the user is frequently active. And when the current IP address of the mobile phone is not consistent with the IP address in the security protocol, the mobile phone is determined to be lost.
S200, if the current IP address of the mobile phone is not consistent with the IP address in the privacy protocol, the Internet of things equipment marks the mobile phone as a lost mobile phone. Further, the internet of things equipment displays alarm information through a display module.
Specifically, if the current IP address of the mobile phone is consistent with the IP address in the security protocol, the method returns to the initial step S100 to continue monitoring. At this point the handset is considered not lost.
Step S200 may include:
s210, if the current IP address of the mobile phone is not consistent with the IP address in the privacy protocol, the Internet of things equipment further reads the local IP address change record and judges whether the current IP address of the mobile phone is consistent with the local IP address change record or not.
S220, if the current IP address of the mobile phone does not accord with the local IP address change record, the Internet of things equipment marks the mobile phone as a lost mobile phone and displays alarm information through a display module.
And S230, if the current IP address of the mobile phone is consistent with the local IP address change record, returning to the initial step S100 and continuing monitoring.
If a user needs to replace a common place or a city of the mobile phone due to business reasons, the city or a specific address to go to can be pre-input through the Internet of things equipment, and the Internet of things equipment can automatically generate an IP address change record according to information input by the user. And subsequently, whether the user is on business, has no lost mobile phone or really loses the mobile phone can be judged through the current IP address of the mobile phone and the change record of the IP address.
For example, if the beijing user goes to hang, the beijing user may record the city or address of the business before the internet of things device. The internet of things device can generate an IP address change record. When the Beijing user arrives at Hangzhou, the Internet of things device detects that the current IP address of the mobile phone changes and is inconsistent with the IP address of Beijing in the privacy protocol, and then further checks the Hangzhou address in the IP address change record, and then the mobile phone can be determined not to be lost.
Optionally, in the IP address determination in this embodiment, it may be determined whether the cities are consistent only by analyzing the IP addresses, so as to determine whether the mobile phone is lost, that is, the city where the mobile phone is located is consistent and is determined not to be lost.
S300, the Internet of things equipment sends a communication establishing instruction to the lost mobile phone.
Specifically, a mobile phone communication module is arranged in the mobile phone. As long as the lost mobile phone is in the power-on state, communication can be established with the Internet of things equipment.
S400, the Internet of things equipment judges whether a communication feedback message returned by the lost mobile phone is received.
Specifically, when the lost mobile phone is in the power-off state, the lost mobile phone cannot return a communication feedback message to the internet of things device.
And S511, if the communication feedback message returned by the lost mobile phone is received, the Internet of things equipment sends a locking instruction to the lost mobile phone, so that the lost mobile phone enters a locking state.
Specifically, when the lost mobile phone is in the power-on state, the lost mobile phone may return a communication feedback message to the internet of things device. The Internet of things equipment further sends a locking instruction to the mobile phone so that the lost mobile phone enters a locking state.
After the mobile phone enters a locked state, a locked page appears on a screen of the mobile phone, a user password is set, and the mobile phone can be continuously used only by inputting the user password, so that a mobile phone user is prevented from losing the mobile phone in subsequent use and snooping mobile phone data of the user.
S512, the Internet of things equipment puts the operation page on any plane through the projection module.
Specifically, the inside projection module that is provided with of thing networking equipment. The projection module can put the operation page of the internet of things device on any plane, such as a wall or a curtain. The projection module can be a patch type projection module, and can be projected through realization only by being pasted on the Internet of things equipment.
S513, the Internet of things equipment logs in the cloud server through the operation page, and all data in the lost mobile phone are imported into the cloud server through the cloud server.
Specifically, the mobile phone enters a locked state and does not affect the import and export of data inside the mobile phone. The user can log in the cloud server through the operation page projected by the projection module. The cloud server is in communication connection with the lost mobile phone, and the communication mode can be in modes of Bluetooth, a local area network, a wireless network and the like. All data in the lost mobile phone can be imported into the cloud server through the cloud server, and the lost mobile phone data can be guaranteed to be retrieved in percentage.
In this embodiment, the current IP address of the mobile phone is monitored through the internet of things device, and whether the mobile phone is lost is determined. By judging whether the communication feedback message returned by the lost mobile phone can be received or not, the mobile phone can be judged to be in the on-off state. The operation page is put on any plane through the projection module, and then the cloud server is logged in through the operation page, so that data transfer can be carried out on the lost mobile phone through the cloud server at any time and any place, the operation is simple, the mobile phone does not need to be backed up, and all data in the lost mobile phone can be found back in percentage.
In addition, the internet of things equipment directly sends the locking instruction to the lost mobile phone without passing through the cloud server, so that the mobile phone can be quickly locked, and a mobile phone embezzler is prevented from snooping the mobile phone. Subsequent data export is interacted through a cloud server instead of the direct interaction between the Internet of things equipment and a mobile phone, so that the legality of the Internet of things equipment needs to be checked when the data are exported. The inspection method is that the internet of things logs in the cloud server, which is also described later.
In an embodiment of the present application, after the step S513, the method further includes the steps of:
and S514, the Internet of things equipment sends a data clearing instruction to the cloud server through the operation page, so that the cloud server forwards the data clearing instruction to the lost mobile phone. And the data clearing instruction is used for deleting all data in the lost mobile phone.
Specifically, in step S513, all data in the lost mobile phone has been exported to the cloud server. In this step, a clear data instruction may be sent to the cloud server through the operation page. Further, the cloud server forwards a clear data instruction to the lost mobile phone. And after the lost mobile phone receives the data clearing instruction, automatically clearing all data in the mobile phone.
In the embodiment, the data clearing instruction is sent to the cloud server through the internet of things device, so that all data of the lost mobile phone can be automatically cleared according to the data clearing instruction, and a mobile phone embezzler is effectively prevented from snooping user data.
In an embodiment of the present application, after the step S400, the method further includes the following steps S521 to S522:
and S521, if the communication feedback message returned by the lost mobile phone is not received, the Internet of things equipment puts the operation page on any plane through the projection module.
S522, the Internet of things equipment logs in the cloud server through the operation page, and sends a locking instruction, a data clearing instruction and a clock signal to the cloud server through the operation page, so that the cloud server sends the locking instruction and the data clearing instruction to the lost mobile phone once every other preset time period, and when the lost mobile phone is started, the lost mobile phone automatically enters a locking state and clears all data.
Specifically, if a communication feedback message returned by the lost mobile phone is not received, it indicates that the lost mobile phone is powered off. At this time, the mobile phone may be lost, power is lost and the mobile phone is powered off, or the mobile phone may be stolen to be powered off actively. In this embodiment, the cloud server can be logged in through the operation page, and the deadlock instruction, the data clearing instruction and the clock signal are sent to the cloud server.
The clock signal includes information for a preset period of time, for example 10 minutes. The cloud server is provided with a timer, and can send a locking instruction and a data clearing instruction to the lost mobile phone every other preset time period according to the clock signal. The operation principle of the lock instruction and the clear data instruction is the same as that of the foregoing embodiment, and will not be described herein again.
In the embodiment, the locking instruction, the data clearing instruction and the clock signal are sent to the cloud server through the internet of things device under the condition that the lost mobile phone cannot return the communication feedback message, so that once the lost mobile phone is in the starting state, the lost mobile phone can receive the locking instruction and the data clearing instruction, automatically enters the locking state and clears all data of the lost mobile phone, and the safety of user data and the safety of the lost mobile phone are guaranteed.
In an embodiment of the present application, after the step S400, the method further includes the following steps S531 to S538:
and S531, if the communication feedback message returned by the lost mobile phone is not received, the Internet of things equipment puts the operation page on any plane through the projection module.
S532, the Internet of things equipment logs in the cloud server through the operation page, the starting state of the lost mobile phone is obtained through the cloud server, and whether the lost mobile phone is in the starting state or not is judged.
S533, if the lost mobile phone is in the power-on state, the internet of things device sends a locking instruction to the lost mobile phone, so that the lost mobile phone enters the locking state.
S534, the internet of things device obtains the first time node when the lost mobile phone is in the power-on state, and obtains the second time node when the internet of things device sends the instruction for establishing communication to the lost mobile phone.
And S535, calculating a difference value between the first time node and the second time node by the Internet of things equipment to obtain the mobile phone loss time, and judging whether the mobile phone loss time is greater than the regular backup time.
And S536, if the mobile phone loss time is greater than the regular backup time, the Internet of things equipment sends a backup instruction to the cloud server through the operation page. And the backup instruction is used for the cloud server to export all data in the lost mobile phone and store the data to the cloud server.
S537, the Internet of things equipment sends a data clearing instruction to the cloud server through the operation page, so that the cloud server forwards the data clearing instruction to the lost mobile phone. And the data clearing instruction is used for deleting all data in the lost mobile phone.
And S538, if the lost mobile phone is in the power-off state, returning to the step S532.
Specifically, the present embodiment is different from the foregoing embodiments in that the foregoing embodiments of step S521 to step S522 do not perform migration backup on the internal data of the lost mobile phone, but directly delete the internal data.
In the embodiment, steps S531 to S538 add a step of determining the mobile phone loss time and the periodic backup time. The mobile phone loss time is a time length, i.e., a time period, and the calculation method is from the time when the internet of things device finds that the lost mobile phone is in a lost state and sends a communication establishment instruction to the lost mobile phone (i.e., a second time node), to the time when the internet of things device obtains that the lost mobile phone is in a powered-on state, i.e., the time when the internet of things device finds that the lost mobile phone is in the powered-on state (i.e., a first time node).
The time difference value between the first time node and the second time node is the mobile phone loss time, and by calculating the time difference value, the mobile phone loss time can be known.
The regular backup time is the interval time between two adjacent backups of the mobile phone. For example, the regular backup time is 3 days, which indicates that the mobile phone exports all data of the mobile phone to the cloud server once every 3 days to complete backup, and after the backup, the data of the mobile phone and the cloud server are consistent. And during each backup, the cloud server needs to be logged in through the Internet of things equipment to perform control operation.
If the mobile phone loss time is longer than the regular backup time, for example, the mobile phone loss time is 7 days, which is longer than the regular backup time by 3 days, it indicates that the lost mobile phone has been lost for a long time, and the data of the lost mobile phone is not backed up to the cloud server in time. The mobile phone data stored in the cloud server is not up-to-date, the internet of things device needs to send a backup instruction to the cloud server through the operation page, all the data of the lost mobile phone are exported to the cloud server, and then all the data in the lost mobile phone are deleted.
Of course, before backing up data, the lost mobile phone needs to be locked, so as to prevent the mobile phone pirate from snooping the data in the mobile phone.
In the embodiment, when the mobile phone loss time is greater than the regular backup time, the mobile phone data is sent to the cloud server in advance, and then the data in the mobile phone is deleted, so that the data in the lost mobile phone can be safely and hundreds retrieved, and the data can be prevented from being snooped by a mobile phone embezzler on the basis.
In an embodiment of the present application, after the step S535, the method further includes the following steps:
s539, if the mobile phone loss time is less than or equal to the periodic backup time, directly executing step S537.
Specifically, if the mobile phone loss time is less than or equal to the regular backup time, the data in the lost mobile phone is backed up, the mobile phone loss time is short, and the next backup time does not exist, and at this time, it can be determined that the data of the lost mobile phone and the mobile phone data stored in the cloud server are almost consistent. Then step S537 can be directly executed to delete the data inside the lost mobile phone without exporting the backup to the cloud server.
In an embodiment of the present application, the step of logging in the cloud server through the operation page includes the following steps S610 to S630:
s610, the Internet of things equipment sends a communication request instruction to the cloud server.
S620, the Internet of things equipment verifies the identity information of the Internet of things equipment through the operation page, and the mode of verifying the identity information is password verification or face recognition.
S630, after the identity information is verified, the Internet of things equipment and the cloud server establish a communication link relation.
Specifically, after the identity information is verified, the cloud account of the user can be logged in through the operation page, and a communication link relation between the internet of things device and the cloud server is established.
In this embodiment, before each time the internet of things device requests communication from the cloud server, the validity of the internet of things device can be ensured by verifying the identity information of the internet of things device, and absolute security is provided for a series of data export and/or data deletion operations initiated by the lost mobile phone through the cloud server for the subsequent internet of things device.
In an embodiment of the application, before the step S100, the method further includes the following steps S010 to S030:
and S010, acquiring the Internet of things equipment ID and the communication protocol in the local database, and judging whether the Internet of things equipment ID is bound with the mobile phone according to the communication protocol.
And S020, if the Internet of things equipment ID is not bound with the mobile phone, sending a first binding instruction to the mobile phone. The first binding instruction is used for establishing a communication link relation between the mobile phone and the Internet of things equipment to generate a communication protocol.
And S030, receiving the communication protocol returned by the mobile phone.
Specifically, the embodiment is a pre-binding process of the mobile phone and the internet of things device.
In an embodiment of the application, after the step S030, the method further includes the following steps S040 to S070:
and S040, the Internet of things equipment sends a communication request instruction to the cloud server.
And S050, verifying the identity information of the Internet of things equipment through the operation page by the Internet of things equipment, wherein the identity information is verified in a password verification or face recognition mode.
And S060, after the identity information is verified, the Internet of things equipment and the cloud server establish a communication link relation.
And S070, sending a second binding instruction to the cloud server by the Internet of things equipment, wherein the second binding instruction is used for establishing a binding relationship among the mobile phone, the local equipment and a cloud account of the cloud server, generating binding data and storing the binding data in the cloud server.
Specifically, the embodiment is a mobile phone, and a pre-binding process of the internet of things device and the cloud server is provided. The cloud account is the cloud account of the user. The method and the system have the advantages that the internet of things equipment does not directly send the instruction to the lost mobile phone, but logs in the cloud server through the cloud account to send the instruction to the lost mobile phone, so that the operation safety is higher. And the storage space of the Internet of things equipment is saved, the mobile phone data can be stored in the cloud data, and a user can take out or transfer the mobile phone data at any time without using a standby mobile phone or other standby equipment to store the mobile phone data.
The application also provides a mobile phone data retrieving system.
As shown in fig. 2, in an embodiment of the present application, the mobile phone data retrieving system includes an internet of things device 10, a mobile phone 20, and a cloud server 30. Cell phone 20 is connected with internet of things device 10 in communication. And the cloud server 30 is in communication connection with the mobile phone 20 and the internet of things device 10 respectively. The internet of things device 10 is configured to execute the mobile phone data retrieving method mentioned in the foregoing.
Specifically, the internet of things device 10 may be one of a bracelet, an earphone, and a smart watch.
As shown in fig. 3, in an embodiment of the present application, the internet of things device 10 includes a processor 110, a projection module 120, and an internet of things device communication module 130. The projection module 120 is electrically connected to the processor 110. The internet of things device communication module 130 is electrically connected to the processor 110. The internet of things device communication module 130 is further in communication connection with the mobile phone 20 and the cloud server 30 respectively.
Specifically, the projection module 120 may be a patch type projection module. The patch type projection module is a compression type and miniaturized projection module. The patch type projection module is carried on the internet of things device 10 so as to put the operation page on a wall, a curtain and other planes.
The internet of things device communication module 130 can communicate with the cloud server 30 and the mobile phone 20 through bluetooth or a wireless protocol. After the internet of things device 10 carries the internet of things device communication module 130, as long as the mobile phone 20 is in the power-on state, the internet of things device 10 can communicate with the mobile phone 20 through bluetooth or a wireless protocol.
For the sake of brevity, the present application only references the various entity portions in the device portion and does not reference the entity portions in the method portion. Such as the internet of things device 10, the processor 110, the projection module 120, the internet of things device communication module 130, the mobile phone 20, the cloud server 30, and the like.
The technical features of the embodiments described above may be arbitrarily combined, the order of execution of the method steps is not limited, and for simplicity of description, all possible combinations of the technical features in the embodiments are not described, however, as long as there is no contradiction between the combinations of the technical features, the combinations of the technical features should be considered as the scope of the present description.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the present application. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present application shall be subject to the appended claims.

Claims (10)

1. A method for retrieving mobile phone data is characterized by comprising the following steps:
s100, the Internet of things equipment acquires the current IP address of the mobile phone and judges whether the current IP address is consistent with the IP address in the privacy protocol or not;
s200, if the current IP address of the mobile phone is inconsistent with the IP address in the privacy protocol, the Internet of things equipment marks the mobile phone as a lost mobile phone and displays alarm information through a display module;
s300, the Internet of things equipment sends a communication establishing instruction to the lost mobile phone;
s400, the Internet of things equipment judges whether a communication feedback message returned by the lost mobile phone is received or not;
s511, if receiving the communication feedback message returned by the lost mobile phone, the Internet of things equipment sends a locking instruction to the lost mobile phone so that the lost mobile phone enters a locking state;
s512, the Internet of things equipment puts the operation page on any plane through a projection module;
s513, the Internet of things equipment logs in the cloud server through the operation page, and all data in the lost mobile phone are imported into the cloud server through the cloud server.
2. The method for retrieving mobile phone data according to claim 1, wherein after the step S513, the method further comprises:
and S514, the Internet of things equipment sends a data clearing instruction to the cloud server through the operation page, so that the cloud server forwards the data clearing instruction to the lost mobile phone, and the data clearing instruction is used for deleting all data in the lost mobile phone.
3. The method for retrieving data of mobile phone according to claim 2, wherein after the step S400, the method further comprises:
s521, if the communication feedback message returned by the lost mobile phone is not received, the Internet of things equipment puts the operation page on any plane through the projection module;
s522, the Internet of things equipment logs in the cloud server through the operation page, and sends a locking instruction, a data clearing instruction and a clock signal to the cloud server through the operation page, so that the cloud server sends the locking instruction and the data clearing instruction to the lost mobile phone once every other preset time period, and when the lost mobile phone is started, the lost mobile phone automatically enters a locking state and clears all data.
4. The method for retrieving data of mobile phone according to claim 3, wherein after the step S400, the method further comprises:
s531, if a communication feedback message returned by the lost mobile phone is not received, the Internet of things equipment puts an operation page on any plane through a projection module;
s532, the Internet of things equipment logs in a cloud server through an operation page, the starting state of the lost mobile phone is obtained through the cloud server, and whether the lost mobile phone is in the starting state or not is judged;
s533, if the lost mobile phone is in the power-on state, the internet of things device sends a locking instruction to the lost mobile phone, so that the lost mobile phone enters a locking state;
s534, the Internet of things equipment acquires a first time node of the lost mobile phone in a power-on state and acquires a second time node of the Internet of things equipment which sends a communication establishing instruction to the lost mobile phone;
s535, calculating a difference value between the first time node and the second time node by the Internet of things equipment to obtain mobile phone loss time, and judging whether the mobile phone loss time is greater than regular backup time or not;
s536, if the mobile phone loss time is greater than the regular backup time, the Internet of things equipment sends a backup instruction to the cloud server through the operation page, and the backup instruction is used for the cloud server to export all data in the lost mobile phone and store the data in the cloud server;
s537, the Internet of things equipment sends a data clearing instruction to the cloud server through the operation page so that the cloud server forwards the data clearing instruction to the lost mobile phone, wherein the data clearing instruction is used for deleting all data in the lost mobile phone;
and S538, if the lost mobile phone is in the power-off state, returning to the step S532.
5. The method for retrieving data from a mobile phone according to claim 4, wherein after the step S535, the method further comprises:
s539, if the mobile phone loss time is less than or equal to the periodic backup time, directly executing step S537.
6. The method for retrieving mobile phone data according to claim 5, wherein the step of logging in the cloud server through the operation page comprises:
s610, the Internet of things equipment sends a communication request instruction to a cloud server;
s620, the Internet of things equipment verifies the identity information of the Internet of things equipment through an operation page, and the mode of verifying the identity information is password verification or face recognition;
s630, after the identity information is verified, the Internet of things equipment and the cloud server establish a communication link relation.
7. The method for retrieving data from a mobile phone according to claim 6, wherein before the step S100, the method further comprises:
s010, acquiring an Internet of things equipment ID and a communication protocol in a local database, and judging whether the Internet of things equipment ID is bound with the mobile phone according to the communication protocol;
s020, if the Internet of things equipment ID is not bound with the mobile phone, sending a first binding instruction to the mobile phone, wherein the first binding instruction is used for establishing a communication link relation between the mobile phone and the Internet of things equipment to generate a communication protocol;
and S030, receiving the communication protocol returned by the mobile phone.
8. The method for retrieving mobile phone data according to claim 7, wherein after the step S030, the method further comprises:
s040, the Internet of things equipment sends a communication request instruction to a cloud server;
s050, the Internet of things equipment verifies the identity information of the Internet of things equipment through an operation page, and the mode of verifying the identity information is password verification or face recognition;
step 060, after the identity information is verified, the internet of things equipment and the cloud server establish a communication link relation;
and S070, sending a second binding instruction to the cloud server by the Internet of things equipment, wherein the second binding instruction is used for establishing a binding relationship among the mobile phone, the local equipment and a cloud account of the cloud server, generating binding data and storing the binding data in the cloud server.
9. A mobile phone data retrieval system, comprising:
the internet of things equipment is used for executing the mobile phone data retrieving method of any one of the preceding claims 1-8;
the mobile phone is in communication connection with the Internet of things equipment;
and the cloud server is in communication connection with the mobile phone and the Internet of things equipment respectively.
10. The method for retrieving mobile phone data according to claim 9, wherein the internet of things device comprises:
a processor;
a projection module electrically connected to the processor;
the Internet of things equipment communication module is electrically connected with the processor; the internet of things equipment communication module is further in communication connection with the mobile phone and the cloud server respectively.
CN202011473612.4A 2020-12-15 2020-12-15 Mobile phone data retrieving method and system Active CN112600923B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011473612.4A CN112600923B (en) 2020-12-15 2020-12-15 Mobile phone data retrieving method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011473612.4A CN112600923B (en) 2020-12-15 2020-12-15 Mobile phone data retrieving method and system

Publications (2)

Publication Number Publication Date
CN112600923A true CN112600923A (en) 2021-04-02
CN112600923B CN112600923B (en) 2022-10-11

Family

ID=75195475

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011473612.4A Active CN112600923B (en) 2020-12-15 2020-12-15 Mobile phone data retrieving method and system

Country Status (1)

Country Link
CN (1) CN112600923B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113609473A (en) * 2021-07-15 2021-11-05 荣耀终端有限公司 Wind control method for retrieving password, terminal equipment and server
CN113778749A (en) * 2021-08-16 2021-12-10 荣耀终端有限公司 Data backup method and electronic equipment

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101472269A (en) * 2007-12-28 2009-07-01 希姆通信息技术(上海)有限公司 Method for retrieving lost mobile phone
US20140327518A1 (en) * 2013-05-03 2014-11-06 James F. R. Loutit Apparatus and method for finding and reporting lost items
CN104507075A (en) * 2014-12-31 2015-04-08 徐雅星 Data protection method for loss of mobile terminal
CN105323709A (en) * 2014-07-31 2016-02-10 三星电子株式会社 A terminal and a method of controlling the same
US20160066189A1 (en) * 2009-02-17 2016-03-03 Lookout, Inc. Methods and systems for addressing mobile communications devices that are lost or stolen but not yet reported as such
CN105426775A (en) * 2015-11-09 2016-03-23 北京联合大学 Method and system for protecting information security of smartphone
CN106161791A (en) * 2016-06-30 2016-11-23 广东小天才科技有限公司 Mutual anti-loss reminding method and system for intelligent terminals
CN106778393A (en) * 2016-12-23 2017-05-31 维沃移动通信有限公司 A kind of information processing method and mobile terminal
WO2017214930A1 (en) * 2016-06-16 2017-12-21 华为技术有限公司 Method and device for communication between wearable device and mobile terminal
CN108200276A (en) * 2017-12-27 2018-06-22 中国地质大学(武汉) A kind of smart mobile phone safety protecting method, equipment and storage device
CN109561068A (en) * 2018-10-23 2019-04-02 芜湖汉科信息技术有限公司 A kind of information terminal safety system

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101472269A (en) * 2007-12-28 2009-07-01 希姆通信息技术(上海)有限公司 Method for retrieving lost mobile phone
US20160066189A1 (en) * 2009-02-17 2016-03-03 Lookout, Inc. Methods and systems for addressing mobile communications devices that are lost or stolen but not yet reported as such
US20140327518A1 (en) * 2013-05-03 2014-11-06 James F. R. Loutit Apparatus and method for finding and reporting lost items
CN105323709A (en) * 2014-07-31 2016-02-10 三星电子株式会社 A terminal and a method of controlling the same
CN104507075A (en) * 2014-12-31 2015-04-08 徐雅星 Data protection method for loss of mobile terminal
CN105426775A (en) * 2015-11-09 2016-03-23 北京联合大学 Method and system for protecting information security of smartphone
WO2017214930A1 (en) * 2016-06-16 2017-12-21 华为技术有限公司 Method and device for communication between wearable device and mobile terminal
CN106161791A (en) * 2016-06-30 2016-11-23 广东小天才科技有限公司 Mutual anti-loss reminding method and system for intelligent terminals
CN106778393A (en) * 2016-12-23 2017-05-31 维沃移动通信有限公司 A kind of information processing method and mobile terminal
CN108200276A (en) * 2017-12-27 2018-06-22 中国地质大学(武汉) A kind of smart mobile phone safety protecting method, equipment and storage device
CN109561068A (en) * 2018-10-23 2019-04-02 芜湖汉科信息技术有限公司 A kind of information terminal safety system

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113609473A (en) * 2021-07-15 2021-11-05 荣耀终端有限公司 Wind control method for retrieving password, terminal equipment and server
CN113778749A (en) * 2021-08-16 2021-12-10 荣耀终端有限公司 Data backup method and electronic equipment
CN113778749B (en) * 2021-08-16 2023-12-12 荣耀终端有限公司 Data backup method and electronic equipment

Also Published As

Publication number Publication date
CN112600923B (en) 2022-10-11

Similar Documents

Publication Publication Date Title
CN112600923B (en) Mobile phone data retrieving method and system
RU2418387C2 (en) Method to disable mobile device
EP1938192B1 (en) Peer-to-peer distributed backup system for mobile devices
CN109040099B (en) Verification method, terminal and system for application
US8560648B2 (en) Location control service
CN104486727A (en) Mobile phone anti-theft method and system based on Android system
WO2014032612A1 (en) Method, device, server, system, and apparatus for preventing information leakage
CN103581441B (en) Mobile terminal follows the trail of burglary-resisting system and method
EP2472923A1 (en) Remote control method and system for smart card
CN111148095A (en) Method for establishing Wi-Fi connection between terminal and wireless access point
CN103853723A (en) Contact information query method, server and terminal
CN104239805A (en) Mobile phone antitheft method and device
JP2020509622A (en) Wireless network type detection method and apparatus and electronic device
CN113032050A (en) Configuration center access method, system, electronic device and storage medium
KR20110111022A (en) Method and apparatus for protecting information in user terminal
CN111461720A (en) Identity verification method and device based on block chain, storage medium and electronic equipment
CN111447069A (en) Low-frequency access data processing method based on block chain
CN106656985A (en) Backup account login method, device and system
WO2018103370A1 (en) System reset method, apparatus and electronic device
CN113269909A (en) Intelligent lock data management system based on Bluetooth communication
CN113114623B (en) Data connection method, device, terminal equipment and computer readable storage medium
CN111092864B (en) Session protection method, device, equipment and readable storage medium
KR20120018965A (en) System and method for providing file backup, restore and delete data perfectly service for mobile terminal and portable computing apparatus device
CN108600964B (en) Mobile terminal tracking and positioning system
CN110891272B (en) Wireless network access authentication method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant