KR100870430B1 - Method for warning and chasing stolen terminal - Google Patents

Method for warning and chasing stolen terminal Download PDF

Info

Publication number
KR100870430B1
KR100870430B1 KR20070085684A KR20070085684A KR100870430B1 KR 100870430 B1 KR100870430 B1 KR 100870430B1 KR 20070085684 A KR20070085684 A KR 20070085684A KR 20070085684 A KR20070085684 A KR 20070085684A KR 100870430 B1 KR100870430 B1 KR 100870430B1
Authority
KR
South Korea
Prior art keywords
terminal
information
server
unique key
transmitting
Prior art date
Application number
KR20070085684A
Other languages
Korean (ko)
Inventor
송환구
Original Assignee
송환구
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 송환구 filed Critical 송환구
Priority to KR20070085684A priority Critical patent/KR100870430B1/en
Application granted granted Critical
Publication of KR100870430B1 publication Critical patent/KR100870430B1/en

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The present invention relates to an alarming and tracking method of a stolen terminal. In particular, when a terminal such as a notebook computer is lost or stolen, the protection program mounted in the terminal is driven to check the IP information assigned to the terminal to track its location. In addition, by outputting an alarm message on the screen of the stolen lost terminal and further stopping the normal operation of the terminal, the terminal learner can induce the report of the lost terminal and protect the data of the terminal.

Description

Alarm and tracking method of theft terminal {METHOD FOR WARNING AND CHASING STOLEN TERMINAL}

The present invention relates to an alarming and tracking method of a stolen terminal. In particular, when a terminal such as a laptop computer is lost or stolen, a protection program mounted in the terminal is driven to check the IP information assigned to the terminal to track its location. The present invention relates to an alarming and tracking method of a stolen terminal, which outputs an alarm message on a screen of a stolen terminal to induce a report of a lost terminal to a terminal learner.

Examples of terminals that can be carried by individuals include laptop computers, mobile communication terminals (e.g., user equipment (UE), mobile phones, cellular phones, DMB phones, DVB-H phones, PDA phones, and PTT phones, etc.), GPS navigation, There are portable game consoles, MP3s, and other portable home appliances, and various contents are provided by content providers due to the development of the Internet and wireless communication.

In particular, the notebook computer can be connected to a website providing various information through the Internet, and the notebook computer is assigned a unique MAC address indicating the address of hardware connected to the network. A unique IP address defined by bits is assigned and used.

In addition, a relatively expensive terminal such as a notebook computer is frequently lost or stolen because the user can carry it conveniently and use it in various places, and efficiently track and confirm the terminal such as the stolen or lost notebook computer. There is no solution yet, so there is an urgent need for a solution.

Therefore, an object of the present invention, if a portable terminal such as a notebook computer is lost or stolen, by running a protection program mounted in the terminal to check the IP information assigned to the terminal to track the location and the screen of the stolen lost terminal By outputting an alarm message on the terminal and further stopping the normal operation of the terminal, the terminal learner can provide a method of alarming and tracking the stolen terminal to induce the report of the lost terminal and protect the data of the terminal. .

In order to achieve the above object, the alarming and tracking method of a stolen terminal according to the present invention, the terminal step of downloading and installing a protection program package from a server through the Internet network; And a second step of the terminal executing the protection program package under a predetermined condition.

The first step may further include: transmitting, by the terminal, terminal information to the server; Storing, by the server, the terminal information in a database; The terminal downloading and installing a protection program package from the server; Generating, by the server, a terminal unique key and transmitting the terminal unique key to the terminal; And storing, by the terminal, the terminal unique key in a memory.

In addition, the second step may include the step of booting the terminal by turning on the power of the terminal receiving the loss report while the server receives the loss report; Transmitting, by the terminal, the terminal unique key information to the server; Transmitting, by the terminal, IP information to the server; Identifying, by the server, the current location of the lost terminal and the terminal through the terminal unique key information and the IP information; And transmitting, by the server, an alarm message to the terminal, outputting the warning message on a screen.

The terminal may further include stopping the normal computer operation by monitoring a message queue of a window in a background form and hooking a signal generated during data input / output.

The terminal unique key may be generated by combining one or more of MAC address information, CPU information, and ID information of the terminal.

The terminal information may include at least one of product number, CPU information, MAC address information, main memory information, and operating system information of the terminal.

The alarm message may include at least one of a message indicating that the corresponding terminal is a lost device, a contact information of the terminal owner, and location tracking contents.

In addition, the server further comprises the step of transmitting the current location information of the terminal to the customer terminal.

In addition, the server further comprises the step of transmitting the current location information of the terminal to the mobile communication terminal of the customer via a wireless network.

The method may further include: authenticating, by the server, through a terminal unique key transmitted from the terminal;

The terminal may further include uploading a predetermined file to the server when the authentication is successful.

According to the present invention, when a terminal such as a notebook computer is lost or stolen, a warning message is output on the screen of the terminal, and further, by forcibly stopping the normal operation of the terminal, the terminal learner induces a report of the lost terminal, You can protect your data.

The basic concept of the present invention is that when a terminal such as a notebook computer is lost or stolen, a protection program mounted in the terminal is driven to check the IP information assigned to the terminal to track its location, and on the screen of the stolen or lost terminal. By outputting an alarm message to the terminal and further stopping the operation of the terminal learner to induce the report of the lost terminal to protect the data of the terminal.

Hereinafter, with reference to the accompanying drawings will be described an embodiment of the alarm and tracking method of theft terminal according to the present invention.

1 is a system configuration for implementing the present invention.

In this system, N notebook computers 40, a customer PC 50 for applying for a service for borrowing the notebook computer 40, and the customer PC 50 apply for service through the Internet 20. Receive registration and payment, the server 10 provides the generated terminal unique key and protection program package to the notebook computer 40, and transmits the SMS message from the server 10 through the wireless network 30 Receiving mobile communication terminal 60 is included.

2 is a signal processing diagram illustrating an alarm and tracking method of a stolen terminal according to an embodiment of the present invention.

First, when a laptop computer is to be rented, a customer applies for a service to an operator server that performs a laptop computer rental business through an internet network through a customer PC (S200).

The server receiving the service request from the customer PC performs a member registration and payment procedure (S201).

When the customer completes the registration process as described above, the server receives the terminal information from the notebook computer that is rented (S202). The terminal information includes a product serial number of a notebook computer, a CPU, a MAC address, main memory information, an operating system, and the like.

The server receiving the terminal information from the notebook computer stores the terminal information in the database (S203).

The server generates a terminal unique key by combining the MAC address, CPU information, and ID information obtained from the terminal information (S204).

In this state, the server transmits a protection program package to the notebook computer, and the notebook computer downloads the protection program package (S205).

The notebook computer installs the downloaded protection program package (S206) and receives the terminal unique key from the server and stores it in the memory (S207, S208).

As described above, when the procedure for installing the protection program between the operator server and the notebook computer is completed, the notebook computer is delivered to the customer.

On the other hand, if the customer does not return the laptop computer that was rented with the intention of malicious intention, or if the customer loses the laptop computer that is rented, or if the laptop computer is not recovered even though the return period has elapsed, or is lost from the customer. In cases where a report is received, the notebook computer executes the protection program package.

The process of executing the protection program package is as follows.

In this example, a case where a loss report is received from a customer is described.

First, when the terminal loss report is transmitted from the customer PC (S300), the server receives the terminal loss report and receives the terminal loss report (S301).

In this state, when the lost notebook computer is powered on and booted by someone (S302), the protection program is automatically driven accordingly (S303).

As the protection program is driven, the notebook computer transmits the terminal unique key information stored in the memory to the server (S304).

The notebook computer sequentially transmits the terminal IP information to the server (S305).

The server confirms that the notebook computer is a loaned lost terminal through the terminal unique key information received from the notebook computer and checks the current location of the notebook computer through the IP information (S306).

When the current location of the lost notebook computer is confirmed, the server transmits a warning message including the message indicating the lost terminal on the screen of the notebook computer, the contact information of the owner, and location information to the notebook computer.

At this time, the alert message is transmitted as an SMS message (S307).

The notebook computer outputs the transmitted alarm message on the terminal screen (308).

And, optionally, after the lost notebook computer is booted, the notebook computer outputs an SMS message on the terminal screen as described above and then checks whether there is a predetermined file to protect the user's work document (S309). According to the result, a predetermined file, for example, a recent work document, a file of a predetermined folder, or the like is transmitted to the server (S310).

In the file transfer, the server authenticates the user through the terminal unique key information received from the notebook computer in advance, and when the user authentication is successful, the notebook computer uploads the background using the FTP (File Transfer Protocol) function. Proceed to

In addition, the server monitors the message queue using the Windows Win32 function HHOOK SetWindowsHookEx in the background format within the notebook computer's operating system, hooking all signals generated on subsequent input / output of the data to ensure normal computer operation. It may be stopped (S311).

In addition, the server transmits the current location information of the lost notebook computer to the customer PC (S312). The server may transmit the current location information of the lost notebook computer to the mobile communication terminal of the customer through the wireless network.

Meanwhile, in addition to the above embodiments, when a user who purchases a notebook computer requests service on the server, when his or her notebook computer is lost or stolen, an alarm message is output on the screen of the notebook computer through the same procedure. You can track your current location.

Also, optionally, the notebook computer outputs an SMS message on the screen of the terminal while the lost notebook computer is booted, and then sends a file (recent work document, pre-designated folder) File, etc.).

In the file transfer, the server authenticates the user through the terminal unique key information received from the notebook computer in advance, and when the user authentication is successful, the notebook computer uploads the background using the FTP (File Transfer Protocol) function. Proceed to

In addition, as described above, SMS messages are output on the screen of the notebook computer while the lost notebook computer is booted, and then the message queue is monitored by using the Windows Win32 function HHOOK SetWindowsHookEx in the background format in the operating system. It is also possible to stop normal computer operation by hooking all signals generated during I / O.

In the above, the present invention has been described with reference to the embodiments shown in the drawings, but this is merely exemplary, and those skilled in the art may realize various modifications and other equivalent embodiments therefrom. Will understand.

1 is a block diagram of a system for implementing the present invention.

2 is a signal processing diagram illustrating a process of installing a protection program according to the present invention.

3 is a signal processing diagram illustrating an execution process of a protection program according to the present invention.

Claims (10)

The first step in which the terminal downloads and installs the protection program package from the server through the Internet network, Transmitting, by the terminal, terminal information to the server; Storing, by the server, the terminal information in a database; The terminal downloading and installing a protection program package from the server; Generating, by the server, a terminal unique key and transmitting the terminal unique key to the terminal; The terminal storing the terminal unique key in a memory; The second step of the terminal to execute the protection program package under a certain condition, Booting the terminal by turning on the power of the terminal receiving the lost report while the server receives the lost report; The terminal transmitting terminal unique key information to the server; Transmitting, by the terminal, IP information to the server; Identifying, by the server, the current location of the lost terminal and the terminal through the terminal unique key information and the IP information; And sending, by the server, an alarm message to the terminal, and outputting the alarm message on a screen. delete delete The method of claim 1, And the terminal monitoring the message queue of the window in a background form and stopping a normal computer operation by hooking a signal generated during data input / output. The method of claim 1, wherein the terminal unique key, And at least one of MAC address information, CPU information, and ID information of the terminal is generated. The method of claim 1, wherein the terminal information, And at least one of product number, CPU information, MAC address information, main memory information, and operating system information of the terminal. The method of claim 1, wherein the alert message, Alarm and tracking method of the stolen terminal, characterized in that it comprises one or more of a message indicating that the terminal is a lost device, the terminal owner's contact information, location tracking. The method of claim 1, The server further comprises the step of transmitting the current location information of the terminal to the customer terminal alarm and tracking method of the stolen terminal. The method of claim 1, The server further comprises the step of transmitting the current location information of the terminal to the mobile communication terminal of the customer via a wireless network alarm and tracking method of the stolen terminal. The method of claim 1, Authenticating, by the server, via a terminal unique key transmitted from the terminal; If the authentication is successful, the terminal further comprises the step of uploading a predetermined file to the server and transmitting the alarm and tracking method of the stolen terminal.
KR20070085684A 2007-08-24 2007-08-24 Method for warning and chasing stolen terminal KR100870430B1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
KR20070085684A KR100870430B1 (en) 2007-08-24 2007-08-24 Method for warning and chasing stolen terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
KR20070085684A KR100870430B1 (en) 2007-08-24 2007-08-24 Method for warning and chasing stolen terminal

Publications (1)

Publication Number Publication Date
KR100870430B1 true KR100870430B1 (en) 2008-11-25

Family

ID=40284736

Family Applications (1)

Application Number Title Priority Date Filing Date
KR20070085684A KR100870430B1 (en) 2007-08-24 2007-08-24 Method for warning and chasing stolen terminal

Country Status (1)

Country Link
KR (1) KR100870430B1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101000256B1 (en) 2010-02-06 2010-12-10 백상주 System and method for identifying an owner using mac address
KR20120004679A (en) * 2010-07-07 2012-01-13 주식회사 디케이아이테크놀로지 System and method for tracking missed portable communication terminal
KR101392047B1 (en) 2012-04-05 2014-05-07 주식회사 엘지씨엔에스 Method of verifying user, server and mobile terminal performing the same
CN112717378A (en) * 2021-01-04 2021-04-30 厦门梦加网络科技股份有限公司 Game animation sending system

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20050073019A (en) * 2004-01-08 2005-07-13 (주)엔트랙시스템 Method for preventing loss of mibile communication terminals and restoring lost terminals

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20050073019A (en) * 2004-01-08 2005-07-13 (주)엔트랙시스템 Method for preventing loss of mibile communication terminals and restoring lost terminals

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101000256B1 (en) 2010-02-06 2010-12-10 백상주 System and method for identifying an owner using mac address
KR20120004679A (en) * 2010-07-07 2012-01-13 주식회사 디케이아이테크놀로지 System and method for tracking missed portable communication terminal
KR101683294B1 (en) * 2010-07-07 2016-12-07 주식회사 디케이아이테크놀로지 System and method for tracking missed portable communication terminal
KR101392047B1 (en) 2012-04-05 2014-05-07 주식회사 엘지씨엔에스 Method of verifying user, server and mobile terminal performing the same
CN112717378A (en) * 2021-01-04 2021-04-30 厦门梦加网络科技股份有限公司 Game animation sending system

Similar Documents

Publication Publication Date Title
CN103200165B (en) Information dispensing method, information distribution system and car-mounted terminal
CN105515768B (en) A kind of methods, devices and systems of more new key
CN105760716B (en) Digital certificates management
CN100507907C (en) Methods and apparatus for content protection in a wireless network
CN101317380B (en) Method and system for license backup and recovery
US8385883B2 (en) Apparatus and methods for locating, tracking and/or recovering a wireless communication device
JP5081941B2 (en) Theft management system, method and program
KR20090112697A (en) A security module having a secondary agent in coordination with a host agent
CN105074658A (en) Pervasive service providing device-specific updates
WO2014032612A1 (en) Method, device, server, system, and apparatus for preventing information leakage
CN103095457A (en) Login and verification method for application program
CN1868153B (en) Methods and apparatus for determining device integrity
US10687216B2 (en) Antitheft method for mobile terminal and apparatus
CN107615294A (en) A kind of identifying code short message display method and mobile terminal
US8432273B2 (en) Method and apparatus for providing device recovery assistance
KR100870430B1 (en) Method for warning and chasing stolen terminal
JP2012230555A (en) Information distribution system and information distribution method
CN108460251B (en) Method, device and system for running application program
JP5498278B2 (en) Data backup system and wireless master unit
JP2008123322A (en) Device and tampering detection system
US20140228000A1 (en) Terminal device, information processing apparatus and activation authentication method
CN111666567A (en) Detection method, device, computer program and medium for malicious modification of application program
US20060238802A1 (en) System and method for providing enterprise wide data security
KR100917417B1 (en) Method of determining effectiveness of universal subsciber identity module card and mobile terminal and mobile terminal using thereof
CN106874746B (en) Application program calling method and device and mobile terminal

Legal Events

Date Code Title Description
A201 Request for examination
E902 Notification of reason for refusal
E90F Notification of reason for final refusal
E701 Decision to grant or registration
GRNT Written decision to grant
FPAY Annual fee payment

Payment date: 20121218

Year of fee payment: 5

FPAY Annual fee payment

Payment date: 20131111

Year of fee payment: 6

LAPS Lapse due to unpaid annual fee