CN1665260A - A remote control method for mobile telephone - Google Patents
A remote control method for mobile telephone Download PDFInfo
- Publication number
- CN1665260A CN1665260A CN 200510024044 CN200510024044A CN1665260A CN 1665260 A CN1665260 A CN 1665260A CN 200510024044 CN200510024044 CN 200510024044 CN 200510024044 A CN200510024044 A CN 200510024044A CN 1665260 A CN1665260 A CN 1665260A
- Authority
- CN
- China
- Prior art keywords
- mobile phone
- short message
- control
- control command
- receiving terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Abstract
The invention provides a mobile telephone remote controlling method, including: a transmitter edits a control short message containing control command and transmits the control short message to a receiving-end mobile telephone; and the receiving-end mobile telephone receives the control short message and draws the control command from the control short message and executes the control command. And as editing a control short message, the transmitter needs to select/input the control command list and control parameters list according to the requirement and inputs the number and control cipher of the receiving-end mobile telephone and after having been edited, the control short message is transmitted to the receiving-end mobile telephone. And the receiving-end mobile telephone receives the short message and then draws the control cipher from it and obtains the ID identification code of the transmitter to compare with the encrypted identification code stored in the mobile telephone: if they are the same, draw the codes of the control command and control parameters, decode them according to the control command list and parameter list and call the corresponding operating function to operate the receiving-end mobile telephone.
Description
[technical field]
The present invention relates in the wireless telecommunication system control method of portable terminal is related in particular to a kind of method of mobile phone being controlled by the mode that sends SMS message.
[background technology]
Along with the development of mobile communication technology, various mobile communication terminals, also more and more perfect as the function of mobile phone, PDA etc.For mobile phone (comprising the mobile phone of common theory and Personal Handyphone System etc.) user, except the function of basic conversation and transmitting-receiving short message, the memory function that also can use mobile phone is stored individual privacy information such as contact method, message registration, short message record, daily arrangement.Made things convenient for searching of user and record with the so many information of mobile phone storage, in case still mobile phone is lost, these information leakage will cause very big influence to user's life.Because the mobile phone volume is less, lose or stolen possibility all very big, in case mobile phone is lost or is stolen, how to prevent in the mobile phone canned data reveal, how to give stolen mobile phone for change in addition how can allow the machine master the very first time to losing or stolen mobile phone carries out remote control operation, all be the new problem that the mobile phone research staff faces.
In existing technology, more common mobile phone anti-theft feature is provided with password and short message warning etc.Chinese patent application discloses No. 1477890 and has disclosed a kind of method of personal information protection; this method promptly allows the user set in advance the mobile phone password and is stored in the read-only memory; and the user wished that the personal information of maintaining secrecy encrypts storage; just can see this enciphered message after having only the correct password (with the identical password of password in being stored in read-only memory) of input, can prevent that like this other people from obtaining this information.
Though this method can be protected user's personal information in theory; but the mobile phone password in this method is the comparison easy crack; such as mobile phone is brushed machine; make mobile phone return to reset condition when dispatching from the factory; the mobile phone password that so former first chance master sets has not just come into force yet, thereby the method for this protection personal information had also just lost efficacy.In addition, the important information user storage that has back on mobile phone is not just left backup again, after mobile phone is lost so, information is also lost thereupon, though the robber can't obtain these information, but the machine master also can't obtain these information again, so this method still can not effectively be avoided machine master's loss.Moreover this method can not help the machine master to give mobile phone for change, so economic loss is unavoidable.
The Chinese invention patent application discloses No. 1434626, all disclosed by secret short message notification for No. 1555183 and No. 1395407 and carried out the antitheft method of mobile phone, briefly, these methods mainly all are whether the information of comparing in the SIM card earlier in start is consistent with the corresponding information in the mobile phone, as whether the PIN PIN code of comparing in the SIM card is consistent with the Mobile Directory Number that is stored in advance in the mobile phone, or whether the international mobile subscriber identity IMSI sign indicating number in the comparison SIM card is consistent with the IMSI sign indicating number that is stored in advance in the mobile phone; If unanimity then mobile phone enters normal holding state, can use; If inconsistent then mobile phone can send SMS message to the preassigned receipt number of machine master, and mobile phone when sending SMS message the robber have no to discover.Like this, no matter which type of mobile phone neocaine the robber changes, and the machine master can know the Mobile Directory Number that the robber changes from the short message of receiving.Well imagine,, will provide very useful clue recovering stolen mobile phone if machine chief commander number offers the police and commmunication company.Though this method might be given stolen mobile phone for change to reduce economic loss of user, but the hope of giving for change in actual applications is also little, also need to take a long time even if give for change, moreover, no matter whether really can give stolen mobile phone for change, a large amount of individual privacies or important information may be revealed, and now a lot of offender to steal mobile phone be in order to utilize the inside canned data crime, obviously be not enough so utilize this method to carry out antitheft merely.On the other hand, this method can only be at the situation of mobile theft, if machine master oneself loses mobile phone, nobody replaces new SIM card, then can't find mobile phone according to sending the short message of returning.
Except stolen and lose both of these case, the user also can run into the other trouble sometimes, during such as working mobile phone is forgotten at home, and stored customer data etc. in the mobile phone to working crucial information, at this moment the user can only oneself come back home and reach mobile phone, and is not only consuming time but also require great effort undoubtedly.
At above-mentioned stolen, lose, drop on all situations such as somewhere, mobile phone is made the commercial city in the function of developing some hommizations energetically, to reduce user's loss in all fields to greatest extent.
[summary of the invention]
The objective of the invention is to provides a kind of long-range control method of mobile phone at above-mentioned the deficiencies in the prior art, makes the user can control mobile phone a long way off.
Another object of the present invention is on the basis of the long-range control method of above-mentioned mobile phone, a kind of mobile phone theft preventing method further is provided, preventing leakage of personal information, or control stolen mobile phone information needed is returned to the machine master, to retrieve machine master's partial loss.
For achieving the above object, the present invention adopts following technical scheme: the long-range control method of mobile phone of the present invention comprises the steps: that the sender edits the control short message that has comprised control command, and sends the control short message to the receiving terminal mobile phone; And the receiving terminal mobile phone receives the control short message, therefrom takes out control command, and carries out control command.
The long-range control method of above-mentioned mobile phone also comprised before the receiving terminal mobile phone sends the control short message carrying out: the sender is according to the control command table on the user interface and parameter list selections/input of control commands and Control Parameter, and the number of input receiving terminal mobile phone and control password.The number of described receiving terminal mobile phone is confirmed according to following method: the receiving terminal mobile phone reads the number information on the current mobile phone card, and read the number information of mobile phone storage inside, when the two not simultaneously, send number information on the current mobile phone card with the form of short message to the receipt number that the machine master presets, this number information will send the destination Mobile Station International ISDN Number of control short message as the sender; If the sender does not obtain receipt, then can directly send to former Mobile Directory Number.
Be sent to the receiving terminal mobile phone after the control short message that the user edits is encoded.The receiving terminal mobile phone takes out the control password earlier after receiving the control short message, by obtaining the identity of the sender authentication code after the functional operation, compare with the encryption authentication code of mobile phone stored, when the identity of the sender authentication code is identical with the mobile phone authentication code, just can call corresponding handling function and carry out control command.Can't show reception and the operating process of controlling short message on the user interface of receiving terminal mobile phone.After executing control command, the receiving terminal mobile phone is deletion control short message record automatically.
Compared with prior art, the long-range control method of mobile phone of the present invention not only can be realized the mobile phone anti-theft feature, all right Long-distance Control mobile phone locking, shutdown, even telephone directory returns, the information passback, and mobile phone is provided with and manages, greatly facilitate management and the use of machine master to mobile phone.
[description of drawings]
Fig. 1 is the composition Organization Chart of the tele-control system that long-range control method adopted of mobile phone of the present invention.
Fig. 2 is the composition schematic diagram of control short message in the long-range control method of mobile phone of the present invention.
Fig. 3 is the transmitting terminal workflow diagram of the long-range control method of mobile phone of the present invention.
Fig. 4 is the receiving terminal workflow diagram of the long-range control method of mobile phone of the present invention.
Fig. 5 is the workflow diagram of the Mobile Directory Number tracking that combines with the long-range control method of mobile phone of the present invention.
[embodiment]
Please refer to shown in Figure 1, the long-range control method of mobile phone of the present invention need adopt a kind of tele-control system to realize, this control system is divided into transmitting terminal and two parts of receiving terminal, and transmitting terminal comprises user's input module 10, control short message memory module 20, control short message coding module 30 and short message sending module 40; Receiving terminal comprises short message types judge module 50, short message sender identification module 60, short message decoder module 70, control command Executive Module 80 and control short message record removing module 90.In the present invention, the support hardware of transmitting terminal can be mobile phone or computer etc., and receiving terminal can only be a mobile phone.
User's input module 10 comprises a visual user interface (or claiming man-machine interface), this user interface can show selective menu according to control command table that transmitting terminal provided and parameter list, and the user can utilize keyboard or mode such as hand-written to select/input of control commands and Control Parameter according to visual menu easily.Above-mentioned control command can be mobile phone locking, shutdown, mobile phone setting, mobile phone management, address list passback, the passback of information record or the like, Control Parameter then is the required concrete parameter of some control command, as telephone number, name, time or the like.See also shown in Figure 2ly, this control command and Control Parameter have constituted the content 13 of control short message jointly.In addition, user's input module 10 also can be pointed out the number (destination Mobile Station International ISDN Number) 14 that the user inputs the receiving terminal mobile phone and the control password 15 of receiving terminal mobile phone.This control password 15 is imported after purchasing machine by the machine master and is advanced mobile phone, encrypts on the memory of authentication code long preservation at mobile phone through forming one after the One-Way Encryption function calculation at the control password 15 of inner identity code ID that can be had according to mobile phone itself of mobile phone and machine primary input.
In mobile phone, common short message and control short message need separate storage.Above-mentioned control short message memory module 20 promptly is specifically designed to storage control short message.The control short message is made up of short message body 12 and short message head 11.The content (comprising control command and Control Parameter) 13 of the control short message of inputing by user's input module 10, the number 14 of receiving terminal mobile phone and control password 15 all are stored in the short message body 12.
Control short message coding module 30 is used for the short message body 12 of control short message is encoded.Before short message sent, the lowermost layer human-machine interface layer of agreement (MMI layer) can be given second layer protocol layer with the short message body 12 behind the coding, was added the short message head 11 of expression short message classification to the short message body 12 after encoding by protocol layer.Present embodiment is to distinguish control short message and common short message by the application identity symbol field of setting in the short message head 11, for example: in the common short message, application identity symbol field is set at 04H, and in the control short message, application identity symbol field is set at 05H.
Short message sending module 40 will be controlled short message by normal short message transmission flow and send.
Short message types judge module 50 is judged the type of received short message by resolving short message head 11, be that received short message is common short message or control short message, in the present embodiment, as long as the application identity that short message types judge module 50 reads in the short message head 11 accords with the type that field can be judged short message, content as application identity symbol field is 04H, then common short message can be judged as,, then the control short message can be judged as if the application identity field is 05H.
Short message sender identification module 60 is used to differentiate short message sender's identity.Short message sender identification module 60 takes out control password 15 (in theory in short message body 12, the only organic master of control password knows, so the correct control password 15 of only organic this talent conference of master input), this control password 15 and mobile phone identity code ID are translated into an identity of the sender authentication code by unidirectional encryption function together, come to compare with the encryption authentication code that originally was stored on the FLASH memory.If the identity of the sender authentication code is identical with the encryption authentication code, then accept this control short message; If the identity of the sender authentication code is different with the encryption authentication code, then abandon this control short message.
Short message decoder module 70 is used for the control short message that receives is decoded.After receiving terminal is received the control short message, take out the coding of control command and Control Parameter in the short message body of this short message decoder module 70 behind the coding, and resolve, thereby learn control command and the Control Parameter that the user imports according to control command table and parameter list.
Control command Executive Module 80 is responsible for carrying out concrete operation according to control command.Such as, control command is " shutdown ", then this control command Executive Module 80 can go shutdown function in the caller to carry out the action of shutdown; If control command is " telephone number passback ", Control Parameter is " Zhang San " simultaneously, and this control command Executive Module 80 will go telephone number in the caller to return function to carry out telephone number with Zhang San and return operation to transmitting terminal so.
The control short message record is removed module 90 and carry out work after control command Executive Module 80 is executed control command, is responsible for the control short message deletion that will receive.
The short message types judge module 50 of above-mentioned receiving terminal, short message sender identification module 60, short message decoder module 70, control command Executive Module 80 and control short message record are removed the work of module 90 and are all carried out in the inner secret of receiving terminal mobile phone, in the process of carrying out, do not have any demonstration or any prompting on the receiving terminal mobile phone, that is to say that the holder of receiving terminal mobile phone is the activity that can not know above-mentioned five modules.
The long-range control method of mobile phone of the present invention sees also Fig. 3 and shown in Figure 4, and Fig. 3 is the workflow diagram of transmitting terminal, and Fig. 4 is the workflow diagram of receiving terminal.
The long-range control method of mobile phone of the present invention comprises the steps:
Control command table and parameter list selection/input of control commands and Control Parameter that step 101, sender show according to user interface, thus control short message body formed;
Step 200, receiving terminal mobile phone receive the short message that transmitting terminal sends;
Step 201, receiving terminal mobile phone are judged the type of the short message that receives according to the content of the symbol of the application identity in message header field.If the control short message, then flow process advances to step 203; If common short message, then flow process advances to step 202;
Step 202, receiving terminal mobile phone are done normal demonstration with this short message and are handled;
Step 203, receiving terminal mobile phone take out the control password from control short message body, calculate according to the One-Way Encryption function, draw the identity of the sender authentication code, compare, thereby judge whether the sender is authorized user with the encryption authentication code of longer-term storage in the mobile phone memory; Authorized user is interpreted as knowing with regular approach the people of control password herein, such as the machine master, perhaps by the people of machine master mandate etc.; If the identity of the sender authentication code is identical with the encryption authentication code, then be judged as authorized user, flow process advances to step 205; If the identity of the sender authentication code is different with the encryption authentication code, then be judged as unauthorized user, flow process advances to step 204;
Step 204, receiving terminal mobile phone are abandoned this control short message, and withdraw from;
Step 205, receiving terminal mobile phone are decoded to this control short message, thereby promptly search the control command table and parameter list parses control command and Control Parameter;
Step 206, receiving terminal mobile phone are carried out control command;
Step 207, receiving terminal mobile phone are deleted this control short message, and withdraw from.
Above-mentioned control command, in preferred embodiment of the present invention, can be mobile phone locking, shutdown, mobile phone setting, address list passback, short message passback, mobile phone management or the like, which kind of control command what no matter transmitting terminal sent is, receiving terminal receives all can carry out in step 206 accordingly after this order and operates.Certainly, be easy to expect, control command be not limited only to above-mentioned these, cooperate the development of mobile phone and need, mobile phone manufacturer and Virtual network operator can be developed more mobile phone control command.
Now a lot of users are that a people uses the mobile phone more than two ones even two ones, if the user wishes to control another mobile phone with the mobile phone of oneself, such as watching the telephone number of storing in another mobile phone, then can utilize disclosed method that another mobile phone is carried out Long-distance Control.
If user's mobile phone is lost or is stolen, the user wishes timely locking mobile phone in case personal information is leaked, and then needs method in conjunction with the long-range control method of mobile phone of the present invention and " Mobile Directory Number tracking " to realize jointly losing or the Long-distance Control of stolen mobile phone.Please refer to shown in Figure 5, the method that described Mobile Directory Number is followed the tracks of requires the user to open the function that Mobile Directory Number is followed the tracks of, and in the mobile phone memory, stored Mobile Directory Number information and default receipt number in advance, this mobile phone tracking comprises the steps:
The method of being followed the tracks of by above Mobile Directory Number as can be known, after mobile phone is lost or is stolen, if because changed new SIM/PIM card or burning number and changed Mobile Directory Number again, then mobile phone can send secret short message from trend receipt number, so former machine master can learn the number of current mobile phone, and as the destination Mobile Station International ISDN Number that sends the control short message in the long-range control method of mobile phone of the present invention, and then realization is to the Long-distance Control of purpose mobile phone.
The long-range control method of mobile phone of the present invention and network are irrelevant, and the transmission and the reception of control short message realize in terminal that fully so network does not need to make any modification, general mobile network communication agreement is at present abideed by in the transmission of control short message fully; In addition, the control command table among the present invention separates with other modules in the mobile phone with parameter list, only needs expansion control command table and parameter list can expand the kind and the content of control command, does not need to change system configuration; At last, the One-Way Encryption function of being mentioned in the above embodiment of the present invention just will be controlled password and convert a kind of computational methods of encrypting authentication code to, and in other embodiments, this method can adopt other security algorithm.
Claims (12)
1. the long-range control method of a mobile phone comprises:
Step 1: the sender has comprised the control short message of control command the transmitting terminal editor, and sends the control short message to the receiving terminal mobile phone; And
Step 2: the receiving terminal mobile phone receives the control short message, therefrom takes out control command, and carries out control command.
2. the long-range control method of mobile phone as claimed in claim 1, it is characterized in that: step 1 further comprises the sender according to control command table and parameter list selection/input of control commands and Control Parameter, and the number of input receiving terminal mobile phone and control password.
3. the long-range control method of mobile phone as claimed in claim 2, it is characterized in that: comprising the steps: also before the execution in step one that the receiving terminal mobile phone reads the number information on the current mobile phone card, and read the number information of mobile phone storage inside, when the two not simultaneously, form with short message sends current number information on this mobile phone card to the receipt number that the machine master presets, and this number information will send the destination Mobile Station International ISDN Number of control short message as the sender.
4. the long-range control method of mobile phone as claimed in claim 1 or 2 is characterized in that: the control short message described in the step 1 is to be different from common short message by the application identity symbol field of setting in the short message format.
5. the long-range control method of mobile phone as claimed in claim 4 is characterized in that: described setting application identity symbol field is finished by protocol layer before short message sends.
6. as the long-range control method of claim 1 or 3 described mobile phones, it is characterized in that: step 2 also comprises after the receiving terminal mobile phone receives the control short message takes out the control password earlier, and by obtaining the identity of the sender authentication code after the functional operation, compare with the encryption authentication code of mobile phone stored, when the identity of the sender authentication code is identical with the encryption authentication code, just can carry out control command.
7. the long-range control method of mobile phone as claimed in claim 6, it is characterized in that: in the step 2, the receiving terminal mobile phone obtains the identity of the sender authentication code according to the One-Way Encryption functional operation.
8. the long-range control method of mobile phone as claimed in claim 6, it is characterized in that: step 2 comprises that also the receiving terminal mobile phone receives the coding that takes out control command behind the control short message, resolve according to control command table and parameter list, and corresponding handling function is operated the receiving terminal mobile phone in the caller.
9. the long-range control method of mobile phone as claimed in claim 8, it is characterized in that: when described control command was the mobile phone locking, the receiving terminal mobile phone called the mobile phone latch function with the mobile phone locking.
10. the long-range control method of mobile phone as claimed in claim 8 is characterized in that: when described control command was the information passback, receiving terminal mobile phone recalls information passback function returned information to transmitting terminal according to Control Parameter.
11. the long-range control method of mobile phone as claimed in claim 6 is characterized in that: in the step 2, do not show the receiving course of controlling short message and the implementation of control command on the user interface of receiving terminal mobile phone.
12. the long-range control method of mobile phone as claimed in claim 6 is characterized in that: in the step 2, after the execution control command finishes, deletion control short message record.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 200510024044 CN1665260A (en) | 2005-02-24 | 2005-02-24 | A remote control method for mobile telephone |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 200510024044 CN1665260A (en) | 2005-02-24 | 2005-02-24 | A remote control method for mobile telephone |
Publications (1)
Publication Number | Publication Date |
---|---|
CN1665260A true CN1665260A (en) | 2005-09-07 |
Family
ID=35036136
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN 200510024044 Pending CN1665260A (en) | 2005-02-24 | 2005-02-24 | A remote control method for mobile telephone |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN1665260A (en) |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2009079947A1 (en) * | 2007-11-21 | 2009-07-02 | Shenzhen Huawei Communication Technologies Co., Ltd. | Method and device for controlling mobile terminal |
CN101902358A (en) * | 2010-07-20 | 2010-12-01 | 中兴通讯股份有限公司 | Method and device for controlling internet use |
CN102065392A (en) * | 2010-12-02 | 2011-05-18 | 中兴通讯股份有限公司 | Communication terminal and short message secret-keeping method thereof |
CN101184265B (en) * | 2007-12-14 | 2011-07-13 | 北京中星微电子有限公司 | Method for monitoring stolen mobile terminal and mobile terminal |
CN102271315A (en) * | 2011-07-26 | 2011-12-07 | 深圳市易联盛世科技有限公司 | Short message enhancement function realization method and device |
CN101296430B (en) * | 2007-04-23 | 2013-06-19 | 英特尔移动通信有限责任公司 | Method for retrieving data, mobile communication terminal and method and server for providing data |
CN103428370A (en) * | 2013-08-23 | 2013-12-04 | 上海华勤通讯技术有限公司 | Mobile phone and multi-user control method thereof |
CN103559433A (en) * | 2013-10-31 | 2014-02-05 | 北京奇虎科技有限公司 | Mobile terminal antitheft method and device |
CN103916408A (en) * | 2012-12-31 | 2014-07-09 | 比亚迪股份有限公司 | Terminal remote control method and system |
CN105451201A (en) * | 2014-09-29 | 2016-03-30 | 展讯通信(天津)有限公司 | Mobile terminal, remote control method of mobile terminal, remote control device of mobile terminal and remote control system of mobile terminal |
CN105516948A (en) * | 2014-09-26 | 2016-04-20 | 华为技术有限公司 | Device control method and device control unit |
CN106778388A (en) * | 2015-11-25 | 2017-05-31 | 神讯电脑(昆山)有限公司 | Communication device and its establishing method |
CN109462701A (en) * | 2018-12-27 | 2019-03-12 | 江苏恒宝智能系统技术有限公司 | A kind of mobile communication control method |
-
2005
- 2005-02-24 CN CN 200510024044 patent/CN1665260A/en active Pending
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101296430B (en) * | 2007-04-23 | 2013-06-19 | 英特尔移动通信有限责任公司 | Method for retrieving data, mobile communication terminal and method and server for providing data |
WO2009079947A1 (en) * | 2007-11-21 | 2009-07-02 | Shenzhen Huawei Communication Technologies Co., Ltd. | Method and device for controlling mobile terminal |
CN101184265B (en) * | 2007-12-14 | 2011-07-13 | 北京中星微电子有限公司 | Method for monitoring stolen mobile terminal and mobile terminal |
CN101902358A (en) * | 2010-07-20 | 2010-12-01 | 中兴通讯股份有限公司 | Method and device for controlling internet use |
CN102065392A (en) * | 2010-12-02 | 2011-05-18 | 中兴通讯股份有限公司 | Communication terminal and short message secret-keeping method thereof |
CN102271315B (en) * | 2011-07-26 | 2014-01-22 | 深圳市易联盛世科技有限公司 | Short message enhancement function realization method and device |
CN102271315A (en) * | 2011-07-26 | 2011-12-07 | 深圳市易联盛世科技有限公司 | Short message enhancement function realization method and device |
CN103916408A (en) * | 2012-12-31 | 2014-07-09 | 比亚迪股份有限公司 | Terminal remote control method and system |
CN103428370A (en) * | 2013-08-23 | 2013-12-04 | 上海华勤通讯技术有限公司 | Mobile phone and multi-user control method thereof |
CN103559433A (en) * | 2013-10-31 | 2014-02-05 | 北京奇虎科技有限公司 | Mobile terminal antitheft method and device |
CN105516948A (en) * | 2014-09-26 | 2016-04-20 | 华为技术有限公司 | Device control method and device control unit |
CN105516948B (en) * | 2014-09-26 | 2019-05-10 | 华为技术有限公司 | A kind of apparatus control method and device |
CN105451201A (en) * | 2014-09-29 | 2016-03-30 | 展讯通信(天津)有限公司 | Mobile terminal, remote control method of mobile terminal, remote control device of mobile terminal and remote control system of mobile terminal |
CN106778388A (en) * | 2015-11-25 | 2017-05-31 | 神讯电脑(昆山)有限公司 | Communication device and its establishing method |
CN109462701A (en) * | 2018-12-27 | 2019-03-12 | 江苏恒宝智能系统技术有限公司 | A kind of mobile communication control method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN1665260A (en) | A remote control method for mobile telephone | |
CN101141721B (en) | Safety mobile telephone based communication custom | |
CN101252703B (en) | Terminal data protecting method, system as well as mobile communication terminal | |
CN101141722B (en) | Safety mobile telephone based on user vocal feature and implementing method thereof | |
CN1285235C (en) | Method and system of preventing handset from theft by using international id code of mobile facilities | |
CN101184265B (en) | Method for monitoring stolen mobile terminal and mobile terminal | |
WO2011153748A1 (en) | Method and apparatus for communicating using spurious contact information | |
CN101960738A (en) | Method and system of providing personal information control service for mobile communication terminal | |
CN102065392A (en) | Communication terminal and short message secret-keeping method thereof | |
CN1533207A (en) | Method for delocking mobile phone radio communication terminal | |
CN1794844A (en) | Method of realizing autometic hidden picture taking and transmitting color message for illegal using mobile phone | |
CN101742731A (en) | Method and device for sharing user identification card | |
CN1859677A (en) | Method for protecting information safety in mobile terminal | |
CN1941958A (en) | Method for automatically destroying cell phone and cell phone thereof | |
CN1606326A (en) | Security management method for mobile phone | |
CN1968539A (en) | Encrypted information processing method and terminal | |
CN1469675A (en) | Method of bundling mobile communication terminal and subscriber identifying module | |
CN101872420A (en) | Encrypted writing signing mobile terminal | |
CN101257358B (en) | Method and system for updating user cipher key | |
CN101415186A (en) | Method for security protection of mobile phone information | |
CN100571436C (en) | A kind of implementation method of mobile terminal information resource safety guarantee | |
CN101895829A (en) | Method and system for retrieving FLASH data from mobile telephone, and mobile telephone | |
TWI502951B (en) | Antitheft devices and methods for use in mobile communication terminal equipment | |
CN105554578B (en) | Plug and play equipment activation method and system thereof | |
CN103595855B (en) | Business card system for mobile phone |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |