KR100870430B1 - Method for warning and chasing stolen terminal - Google Patents
Method for warning and chasing stolen terminal Download PDFInfo
- Publication number
- KR100870430B1 KR100870430B1 KR20070085684A KR20070085684A KR100870430B1 KR 100870430 B1 KR100870430 B1 KR 100870430B1 KR 20070085684 A KR20070085684 A KR 20070085684A KR 20070085684 A KR20070085684 A KR 20070085684A KR 100870430 B1 KR100870430 B1 KR 100870430B1
- Authority
- KR
- South Korea
- Prior art keywords
- terminal
- information
- server
- unique key
- transmitting
- Prior art date
Links
Images
Landscapes
- Mobile Radio Communication Systems (AREA)
- Telephone Function (AREA)
- Telephonic Communication Services (AREA)
Abstract
The present invention relates to an alarming and tracking method of a stolen terminal. In particular, when a terminal such as a notebook computer is lost or stolen, the protection program mounted in the terminal is driven to check the IP information assigned to the terminal to track its location. In addition, by outputting an alarm message on the screen of the stolen lost terminal and further stopping the normal operation of the terminal, the terminal learner can induce the report of the lost terminal and protect the data of the terminal.
Description
The present invention relates to an alarming and tracking method of a stolen terminal. In particular, when a terminal such as a laptop computer is lost or stolen, a protection program mounted in the terminal is driven to check the IP information assigned to the terminal to track its location. The present invention relates to an alarming and tracking method of a stolen terminal, which outputs an alarm message on a screen of a stolen terminal to induce a report of a lost terminal to a terminal learner.
Examples of terminals that can be carried by individuals include laptop computers, mobile communication terminals (e.g., user equipment (UE), mobile phones, cellular phones, DMB phones, DVB-H phones, PDA phones, and PTT phones, etc.), GPS navigation, There are portable game consoles, MP3s, and other portable home appliances, and various contents are provided by content providers due to the development of the Internet and wireless communication.
In particular, the notebook computer can be connected to a website providing various information through the Internet, and the notebook computer is assigned a unique MAC address indicating the address of hardware connected to the network. A unique IP address defined by bits is assigned and used.
In addition, a relatively expensive terminal such as a notebook computer is frequently lost or stolen because the user can carry it conveniently and use it in various places, and efficiently track and confirm the terminal such as the stolen or lost notebook computer. There is no solution yet, so there is an urgent need for a solution.
Therefore, an object of the present invention, if a portable terminal such as a notebook computer is lost or stolen, by running a protection program mounted in the terminal to check the IP information assigned to the terminal to track the location and the screen of the stolen lost terminal By outputting an alarm message on the terminal and further stopping the normal operation of the terminal, the terminal learner can provide a method of alarming and tracking the stolen terminal to induce the report of the lost terminal and protect the data of the terminal. .
In order to achieve the above object, the alarming and tracking method of a stolen terminal according to the present invention, the terminal step of downloading and installing a protection program package from a server through the Internet network; And a second step of the terminal executing the protection program package under a predetermined condition.
The first step may further include: transmitting, by the terminal, terminal information to the server; Storing, by the server, the terminal information in a database; The terminal downloading and installing a protection program package from the server; Generating, by the server, a terminal unique key and transmitting the terminal unique key to the terminal; And storing, by the terminal, the terminal unique key in a memory.
In addition, the second step may include the step of booting the terminal by turning on the power of the terminal receiving the loss report while the server receives the loss report; Transmitting, by the terminal, the terminal unique key information to the server; Transmitting, by the terminal, IP information to the server; Identifying, by the server, the current location of the lost terminal and the terminal through the terminal unique key information and the IP information; And transmitting, by the server, an alarm message to the terminal, outputting the warning message on a screen.
The terminal may further include stopping the normal computer operation by monitoring a message queue of a window in a background form and hooking a signal generated during data input / output.
The terminal unique key may be generated by combining one or more of MAC address information, CPU information, and ID information of the terminal.
The terminal information may include at least one of product number, CPU information, MAC address information, main memory information, and operating system information of the terminal.
The alarm message may include at least one of a message indicating that the corresponding terminal is a lost device, a contact information of the terminal owner, and location tracking contents.
In addition, the server further comprises the step of transmitting the current location information of the terminal to the customer terminal.
In addition, the server further comprises the step of transmitting the current location information of the terminal to the mobile communication terminal of the customer via a wireless network.
The method may further include: authenticating, by the server, through a terminal unique key transmitted from the terminal;
The terminal may further include uploading a predetermined file to the server when the authentication is successful.
According to the present invention, when a terminal such as a notebook computer is lost or stolen, a warning message is output on the screen of the terminal, and further, by forcibly stopping the normal operation of the terminal, the terminal learner induces a report of the lost terminal, You can protect your data.
The basic concept of the present invention is that when a terminal such as a notebook computer is lost or stolen, a protection program mounted in the terminal is driven to check the IP information assigned to the terminal to track its location, and on the screen of the stolen or lost terminal. By outputting an alarm message to the terminal and further stopping the operation of the terminal learner to induce the report of the lost terminal to protect the data of the terminal.
Hereinafter, with reference to the accompanying drawings will be described an embodiment of the alarm and tracking method of theft terminal according to the present invention.
1 is a system configuration for implementing the present invention.
In this system,
2 is a signal processing diagram illustrating an alarm and tracking method of a stolen terminal according to an embodiment of the present invention.
First, when a laptop computer is to be rented, a customer applies for a service to an operator server that performs a laptop computer rental business through an internet network through a customer PC (S200).
The server receiving the service request from the customer PC performs a member registration and payment procedure (S201).
When the customer completes the registration process as described above, the server receives the terminal information from the notebook computer that is rented (S202). The terminal information includes a product serial number of a notebook computer, a CPU, a MAC address, main memory information, an operating system, and the like.
The server receiving the terminal information from the notebook computer stores the terminal information in the database (S203).
The server generates a terminal unique key by combining the MAC address, CPU information, and ID information obtained from the terminal information (S204).
In this state, the server transmits a protection program package to the notebook computer, and the notebook computer downloads the protection program package (S205).
The notebook computer installs the downloaded protection program package (S206) and receives the terminal unique key from the server and stores it in the memory (S207, S208).
As described above, when the procedure for installing the protection program between the operator server and the notebook computer is completed, the notebook computer is delivered to the customer.
On the other hand, if the customer does not return the laptop computer that was rented with the intention of malicious intention, or if the customer loses the laptop computer that is rented, or if the laptop computer is not recovered even though the return period has elapsed, or is lost from the customer. In cases where a report is received, the notebook computer executes the protection program package.
The process of executing the protection program package is as follows.
In this example, a case where a loss report is received from a customer is described.
First, when the terminal loss report is transmitted from the customer PC (S300), the server receives the terminal loss report and receives the terminal loss report (S301).
In this state, when the lost notebook computer is powered on and booted by someone (S302), the protection program is automatically driven accordingly (S303).
As the protection program is driven, the notebook computer transmits the terminal unique key information stored in the memory to the server (S304).
The notebook computer sequentially transmits the terminal IP information to the server (S305).
The server confirms that the notebook computer is a loaned lost terminal through the terminal unique key information received from the notebook computer and checks the current location of the notebook computer through the IP information (S306).
When the current location of the lost notebook computer is confirmed, the server transmits a warning message including the message indicating the lost terminal on the screen of the notebook computer, the contact information of the owner, and location information to the notebook computer.
At this time, the alert message is transmitted as an SMS message (S307).
The notebook computer outputs the transmitted alarm message on the terminal screen (308).
And, optionally, after the lost notebook computer is booted, the notebook computer outputs an SMS message on the terminal screen as described above and then checks whether there is a predetermined file to protect the user's work document (S309). According to the result, a predetermined file, for example, a recent work document, a file of a predetermined folder, or the like is transmitted to the server (S310).
In the file transfer, the server authenticates the user through the terminal unique key information received from the notebook computer in advance, and when the user authentication is successful, the notebook computer uploads the background using the FTP (File Transfer Protocol) function. Proceed to
In addition, the server monitors the message queue using the Windows Win32 function HHOOK SetWindowsHookEx in the background format within the notebook computer's operating system, hooking all signals generated on subsequent input / output of the data to ensure normal computer operation. It may be stopped (S311).
In addition, the server transmits the current location information of the lost notebook computer to the customer PC (S312). The server may transmit the current location information of the lost notebook computer to the mobile communication terminal of the customer through the wireless network.
Meanwhile, in addition to the above embodiments, when a user who purchases a notebook computer requests service on the server, when his or her notebook computer is lost or stolen, an alarm message is output on the screen of the notebook computer through the same procedure. You can track your current location.
Also, optionally, the notebook computer outputs an SMS message on the screen of the terminal while the lost notebook computer is booted, and then sends a file (recent work document, pre-designated folder) File, etc.).
In the file transfer, the server authenticates the user through the terminal unique key information received from the notebook computer in advance, and when the user authentication is successful, the notebook computer uploads the background using the FTP (File Transfer Protocol) function. Proceed to
In addition, as described above, SMS messages are output on the screen of the notebook computer while the lost notebook computer is booted, and then the message queue is monitored by using the Windows Win32 function HHOOK SetWindowsHookEx in the background format in the operating system. It is also possible to stop normal computer operation by hooking all signals generated during I / O.
In the above, the present invention has been described with reference to the embodiments shown in the drawings, but this is merely exemplary, and those skilled in the art may realize various modifications and other equivalent embodiments therefrom. Will understand.
1 is a block diagram of a system for implementing the present invention.
2 is a signal processing diagram illustrating a process of installing a protection program according to the present invention.
3 is a signal processing diagram illustrating an execution process of a protection program according to the present invention.
Claims (10)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR20070085684A KR100870430B1 (en) | 2007-08-24 | 2007-08-24 | Method for warning and chasing stolen terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR20070085684A KR100870430B1 (en) | 2007-08-24 | 2007-08-24 | Method for warning and chasing stolen terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
KR100870430B1 true KR100870430B1 (en) | 2008-11-25 |
Family
ID=40284736
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR20070085684A KR100870430B1 (en) | 2007-08-24 | 2007-08-24 | Method for warning and chasing stolen terminal |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR100870430B1 (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101000256B1 (en) | 2010-02-06 | 2010-12-10 | 백상주 | System and method for identifying an owner using mac address |
KR20120004679A (en) * | 2010-07-07 | 2012-01-13 | 주식회사 디케이아이테크놀로지 | System and method for tracking missed portable communication terminal |
KR101392047B1 (en) | 2012-04-05 | 2014-05-07 | 주식회사 엘지씨엔에스 | Method of verifying user, server and mobile terminal performing the same |
CN112717378A (en) * | 2021-01-04 | 2021-04-30 | 厦门梦加网络科技股份有限公司 | Game animation sending system |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20050073019A (en) * | 2004-01-08 | 2005-07-13 | (주)엔트랙시스템 | Method for preventing loss of mibile communication terminals and restoring lost terminals |
-
2007
- 2007-08-24 KR KR20070085684A patent/KR100870430B1/en not_active IP Right Cessation
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20050073019A (en) * | 2004-01-08 | 2005-07-13 | (주)엔트랙시스템 | Method for preventing loss of mibile communication terminals and restoring lost terminals |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101000256B1 (en) | 2010-02-06 | 2010-12-10 | 백상주 | System and method for identifying an owner using mac address |
KR20120004679A (en) * | 2010-07-07 | 2012-01-13 | 주식회사 디케이아이테크놀로지 | System and method for tracking missed portable communication terminal |
KR101683294B1 (en) * | 2010-07-07 | 2016-12-07 | 주식회사 디케이아이테크놀로지 | System and method for tracking missed portable communication terminal |
KR101392047B1 (en) | 2012-04-05 | 2014-05-07 | 주식회사 엘지씨엔에스 | Method of verifying user, server and mobile terminal performing the same |
CN112717378A (en) * | 2021-01-04 | 2021-04-30 | 厦门梦加网络科技股份有限公司 | Game animation sending system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103200165B (en) | Information dispensing method, information distribution system and car-mounted terminal | |
CN105515768B (en) | A kind of methods, devices and systems of more new key | |
CN105760716B (en) | Digital certificates management | |
CN100507907C (en) | Methods and apparatus for content protection in a wireless network | |
CN101317380B (en) | Method and system for license backup and recovery | |
US8385883B2 (en) | Apparatus and methods for locating, tracking and/or recovering a wireless communication device | |
JP5081941B2 (en) | Theft management system, method and program | |
KR20090112697A (en) | A security module having a secondary agent in coordination with a host agent | |
CN105074658A (en) | Pervasive service providing device-specific updates | |
WO2014032612A1 (en) | Method, device, server, system, and apparatus for preventing information leakage | |
CN103095457A (en) | Login and verification method for application program | |
CN1868153B (en) | Methods and apparatus for determining device integrity | |
US10687216B2 (en) | Antitheft method for mobile terminal and apparatus | |
CN107615294A (en) | A kind of identifying code short message display method and mobile terminal | |
US8432273B2 (en) | Method and apparatus for providing device recovery assistance | |
KR100870430B1 (en) | Method for warning and chasing stolen terminal | |
JP2012230555A (en) | Information distribution system and information distribution method | |
CN108460251B (en) | Method, device and system for running application program | |
JP5498278B2 (en) | Data backup system and wireless master unit | |
JP2008123322A (en) | Device and tampering detection system | |
US20140228000A1 (en) | Terminal device, information processing apparatus and activation authentication method | |
CN111666567A (en) | Detection method, device, computer program and medium for malicious modification of application program | |
US20060238802A1 (en) | System and method for providing enterprise wide data security | |
KR100917417B1 (en) | Method of determining effectiveness of universal subsciber identity module card and mobile terminal and mobile terminal using thereof | |
CN106874746B (en) | Application program calling method and device and mobile terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A201 | Request for examination | ||
E902 | Notification of reason for refusal | ||
E90F | Notification of reason for final refusal | ||
E701 | Decision to grant or registration | ||
GRNT | Written decision to grant | ||
FPAY | Annual fee payment |
Payment date: 20121218 Year of fee payment: 5 |
|
FPAY | Annual fee payment |
Payment date: 20131111 Year of fee payment: 6 |
|
LAPS | Lapse due to unpaid annual fee |