CN101184265B - Method for monitoring stolen mobile terminal and mobile terminal - Google Patents

Method for monitoring stolen mobile terminal and mobile terminal Download PDF

Info

Publication number
CN101184265B
CN101184265B CN2007101796174A CN200710179617A CN101184265B CN 101184265 B CN101184265 B CN 101184265B CN 2007101796174 A CN2007101796174 A CN 2007101796174A CN 200710179617 A CN200710179617 A CN 200710179617A CN 101184265 B CN101184265 B CN 101184265B
Authority
CN
China
Prior art keywords
mobile terminal
monitoring
owner
portable terminal
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN2007101796174A
Other languages
Chinese (zh)
Other versions
CN101184265A (en
Inventor
高保卫
李红波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanxi Zhongtianxin Science And Technology Co ltd
Original Assignee
Vimicro Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vimicro Corp filed Critical Vimicro Corp
Priority to CN2007101796174A priority Critical patent/CN101184265B/en
Publication of CN101184265A publication Critical patent/CN101184265A/en
Application granted granted Critical
Publication of CN101184265B publication Critical patent/CN101184265B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a method for monitoring a stolen mobile terminal and a mobile terminal. The method comprises the following steps: monitor labels are pre-stored on the mobile terminal; when the mobile terminal is stolen, the stolen mobile terminal receives a monitor startup order sent by a monitor terminal, and a judgment is made about whether the monitor labels in the order are the same with the self-stored monitor labels; if the labels are the same, the mobile terminal enters the monitor state and receives the monitor of the monitor terminal. The invention has the advantages that: the stolen mobile terminal can be monitored and the harm brought by missing the mobile terminal is reduced.

Description

The method of monitoring stolen mobile terminal and portable terminal
Technical field
The present invention relates to the mobile communication technology field, be specifically related to a kind of method and a kind of portable terminal of monitoring stolen mobile terminal.
Background technology
Along with the development of mobile communications network, portable terminal becomes the means of communication of more and more popularizing.But existing portable terminal does not have anti-theft feature, and after portable terminal was stolen, unless stealer is initiatively returned portable terminal, otherwise the owner of lost property can't fetch portable terminal.Portable terminal is stolen not only can to bring economic loss to the owner of lost property, and because the personal information of having stored the owner of lost property in the portable terminal is as phone directory, communications records etc., also can and extort the owner of lost property's household, friend's chance to stealer manufacturing harassing and wrecking, also cause loss economically for the owner of lost property's household, friend, cause spiritual puzzlement to the owner of lost property simultaneously.
Summary of the invention
The invention provides a kind of method and a kind of portable terminal of monitoring stolen mobile terminal,, reduce the stolen infringement that brings of portable terminal with at this portable terminal of the stolen back monitoring of portable terminal.
Technical scheme of the present invention is achieved in that
A kind of method of monitoring stolen mobile terminal, stolen mobile terminal are preserved the monitoring sign in advance, comprising:
Stolen mobile terminal receives the monitoring starting command that monitor terminal is sent, and judges whether the monitoring sign in this order is marking matched with the monitoring of self preserving, if coupling enters monitored state, accepts the monitoring of monitor terminal.
A kind of portable terminal comprises:
Monitoring sign memory module, storage monitoring sign;
Monitored startup module receives the monitoring starting command that monitor terminal is sent, and judges whether the monitoring sign in this order is marking matched with the monitoring of monitoring in the sign memory module, if enter monitored state indication to monitored administration module transmission;
Monitored administration module receives the monitored state indication that enters that monitored startup module sends, and begins to accept the monitoring of monitor terminal.
Compared with prior art, the present invention is by preserving the monitoring sign in advance on portable terminal, after portable terminal is stolen, stolen mobile terminal receives the monitoring starting command that monitor terminal is sent, and judges whether the monitoring sign in this order is marking matched with the monitoring of self preserving, if coupling, enter monitored state, accept the monitoring of monitor terminal, make and after portable terminal is stolen, can monitor this portable terminal, thereby reduced the stolen infringement that brings of portable terminal.
Description of drawings
The flow chart of the monitoring stolen mobile terminal that Fig. 1 provides for the embodiment of the invention;
After the stolen mobile terminal that Fig. 2 provides for the embodiment of the invention entered monitored state, monitor terminal obtained the flow chart of stolen mobile terminal SIM card number;
After the stolen mobile terminal that Fig. 3 provides for the embodiment of the invention entered monitored state, monitor terminal obtained the flow chart of the owner of lost property's information on the stolen mobile terminal;
After the stolen mobile terminal that Fig. 4 provides for the embodiment of the invention entered monitored state, monitor terminal obtained the flow chart of stolen mobile terminal place subdistrict position;
After the stolen mobile terminal that Fig. 5 provides for the embodiment of the invention entered monitored state, monitor terminal obtained the flow chart of the information of stealer;
After the stolen mobile terminal that Fig. 6 provides for the embodiment of the invention entered monitored state, monitor terminal was got involved the flow chart of the communication process of stealer;
After the stolen mobile terminal that Fig. 7 provides for the embodiment of the invention enters monitored state, make the flow chart that stolen mobile terminal stops to communicate by letter;
The structural representation of the portable terminal that Fig. 8 provides for the embodiment of the invention.
Embodiment
The present invention is further described in more detail below in conjunction with drawings and the specific embodiments.
The flow chart of the monitoring stolen mobile terminal that Fig. 1 provides for the embodiment of the invention, setting portable terminal A in the present embodiment is stolen mobile terminal, as shown in Figure 1, its concrete steps are as follows:
Step 101: the monitoring sign is set on portable terminal A.
The monitoring sign can be the number of password, monitoring portable terminal etc.For example: if certain user has two portable terminal A, B, can on portable terminal A, monitor the number that sign is set to portable terminal B, on portable terminal B, monitor sign and be set to the number of portable terminal A, thereby portable terminal A, B are bound the other side's monitor terminal mutually.
Step 102: the user finds that portable terminal A is stolen, starts the monitoring function of portable terminal B, and portable terminal B sends the monitoring starting command to portable terminal A, and the monitoring sign is carried in this order.
A monitoring function button can be set on portable terminal B, after the owner of lost property finds that portable terminal A is stolen, select or import the number of portable terminal A on portable terminal B, and click this monitoring function button, triggering mobile terminals B sends the monitoring starting command to portable terminal A.
The monitoring starting command can send with short message way.
Step 103: portable terminal A receives the monitoring starting command, judges whether the monitoring sign that this order carries is marking matched with the monitoring of self preserving, if, execution in step 105; Otherwise, execution in step 104.
Step 104: portable terminal A does not deal with, and this flow process finishes.
Step 105: portable terminal A enters monitored state.
After portable terminal A entered monitored state, portable terminal B just can send monitor command to portable terminal A, and monitor command is divided into following several situation usually:
Situation one, obtain the stolen mobile terminal number.
After portable terminal was stolen, stealer was communicated by letter with oneself for fear of the owner of lost property, the number that can change stolen mobile terminal usually as: change subscriber identification module (SIM, Subscriber Identity Module) card.If the owner of lost property can learn the number after the change, thereby communicates by letter with stealer, this can increase the possibility of recovering stolen mobile terminal greatly.
Situation two, obtain the owner of lost property's information on the stolen mobile terminal, and the owner of lost property's information on the damage stolen mobile terminal.
Preserved the owner of lost property's information such as phone directory, short message record, communications records on the stolen mobile terminal, the common all communication modes with household, friend of people are recorded on the portable terminal of oneself now, portable terminal is stolen makes troubles for the owner of lost property's life, work, therefore, after portable terminal is stolen, if the owner of lost property's information on the portable terminal can be sent to the owner of lost property, will greatly make things convenient for the owner of lost property's life, work.In addition, owner of lost property's information of preserving on the portable terminal not only relates to the owner of lost property's individual privacy, simultaneously also can be to stealer manufacturing personation owner of lost property identity extortion owner of lost property household, friend's chance, therefore, after portable terminal is stolen, if can in time damage the owner of lost property's information on the portable terminal, then will reduce greatly to the owner of lost property and to the owner of lost property's household, friend's infringement.
Situation three, obtain stolen mobile terminal place subdistrict position.
Portable terminal by with the communicating by letter of base station, can perception self place subdistrict position, if after portable terminal is stolen, can know the subdistrict position at stolen mobile terminal place, this will help tracking stealer such as the owner of lost property, public security organ and then track down this pilferage case.Especially when stealer is frequently committed a crime, help public security organ and dwindle the suspicion scope.
Situation four, obtain the information of the stealer on the stolen mobile terminal, comprising: phone directory, short message record and message registration.
After portable terminal is stolen, if the information that can get access to the stealer on the stolen mobile terminal is as phone directory, short message record and message registration, then can learn the household of stealer, friend's communication mode, the owner of lost property can palm off stealer and communicate by letter with household, the friend of stealer, the household, the friend that perhaps palm off stealer communicate by letter with stealer, can increase the possibility of recovering stolen mobile terminal greatly like this.
The communication process of situation five, intervention stealer.
After portable terminal is stolen, if communicating by letter with stealer, the owner of lost property usually can directly be refused, as if at stealer with his family, when friend communicates, get involved this communication process then also increasing the possibility of recovering stolen mobile terminal by stealer.
Situation six, refusal stealer use stolen mobile terminal to communicate.
After portable terminal is stolen, if stealer continue to use original number as: SIM card number etc. communicates, and then can bring economic loss to the owner of lost property; Mention simultaneously, also can bring inconvenience in life, the work etc. to the owner of lost property as situation two.If can be after finding that portable terminal is stolen, the refusal stealer uses stolen mobile terminal to communicate, and then can eliminate above-mentioned infringement.
At above-mentioned six kinds of situations, the present invention provides corresponding solution.
In following each embodiment, with embodiment illustrated in fig. 1 corresponding, setting portable terminal A is stolen mobile terminal, and portable terminal B is a monitor terminal.
After the stolen mobile terminal that Fig. 2 provides for the embodiment of the invention entered monitored state, monitor terminal obtained the flow chart of the number of stolen mobile terminal, and as shown in Figure 2, its concrete steps are as follows:
Step 201: portable terminal A enters monitored state, the number that detects self take place change as: SIM card is replaced, and the number after the change is sent to portable terminal B.
Step 202: portable terminal B receives the number of portable terminal A, uses this number to communicate by letter with portable terminal A.
After the stolen mobile terminal that Fig. 3 provides for the embodiment of the invention entered monitored state, monitor terminal obtained the flow chart of the owner of lost property's information on the stolen mobile terminal, and as shown in Figure 2, its concrete steps are as follows:
Step 301: portable terminal A enters monitored state, and mobile terminal receive B sends obtains owner of lost property's message command, and owner of lost property's information such as the owner of lost property's of self storage phone directory, short message record, communications records are sent to portable terminal B.
Step 302: portable terminal A receives the deletion owner of lost property message command that portable terminal B sends, and owner of lost property's information that self is preserved is as contents such as phone directory, short message record, message registration deletions.
After the stolen mobile terminal that Fig. 4 provides for the embodiment of the invention entered monitored state, monitor terminal obtained the flow chart of stolen mobile terminal place subdistrict position, and as shown in Figure 4, its concrete steps are as follows:
Step 401: portable terminal A enters monitored state, and mobile terminal receive B sends obtains the subdistrict position order.
Step 402: portable terminal A sends to portable terminal B with current self place location information of cell.
After the stolen mobile terminal that Fig. 5 provides for the embodiment of the invention entered monitored state, monitor terminal obtained the flow chart of the information of stealer, and as shown in Figure 5, its concrete steps are as follows:
Step 501: portable terminal A enters monitored state, and mobile terminal receive B sends obtains the stealer message command.
Step 502: portable terminal A with self the storage stealer information as: contents such as phone directory, short message record, message registration send to portable terminal B.
Portable terminal A can issue portable terminal B with telephone directory information, short message record, the communications records of receiving after the monitoring starting command that portable terminal B sends certainly or stealer is changed after the SIM card.
Step 503: portable terminal B receives the information of stealer, and this information is presented on the screen.
Step 504: the owner of lost property selects the household of a stealer or friend's number according to the information of stealer, communicates by letter with the household or the friend of stealer by this number.
Step 505: the owner of lost property is according to the information of stealer, select the household of a stealer or friend's number, on portable terminal B, select or import this number, portable terminal B sends the order of personation short message to portable terminal A, and the household or the friend's of selected stealer number and content of short message carried in this order.
Step 506: portable terminal A receives the order of personation short message, content of short message in this order is presented on the screen, and the household of the stealer in will ordering or friend's number, are sent for oneself friend or household so that stealer is thought this short message by mistake on screen as caller ID display.
After the stolen mobile terminal that Fig. 6 provides for the embodiment of the invention entered monitored state, monitor terminal was got involved the flow chart of the communication process of stealer, and as shown in Figure 6, its concrete steps are as follows:
Step 601: portable terminal A enters monitored state, and the communication that mobile terminal receive B sends gets involved order.
Short message sign or conversation sign can be further carried in this order, get involved the short message communication process with indication and still get involved communication process.In the present embodiment, set communication intervention order and do not carry the short message sign, also do not carry the i.e. expression of conversation sign and get involved short message and communication process simultaneously.
Perhaps, communication intervention order can be divided into short message and get involved order and conversation intervention order, the former represents to get involved the short message process, and the latter represents to get involved communication process.
Step 602: portable terminal A detects stealer and imports short message to self, then when sending SMS message, the number of portable terminal B is added the destination Mobile Station International ISDN Number field of short message, short message is sent to portable terminal B.
Step 603: portable terminal A detects stealer and is dialing calledly, then when sending message related to calls, the number of portable terminal B is added the destination Mobile Station International ISDN Number field of message related to calls, message related to calls is sent to portable terminal B.
Step 604: portable terminal A detects stealer and called 's call through, then dialog context is transferred to portable terminal B.
At this moment, the owner of lost property not only can listen to stealer and called dialog context, simultaneously, and also can be directly and the stealer conversation.
After the stolen mobile terminal that Fig. 7 provides for the embodiment of the invention enters monitored state, make the flow chart that stolen mobile terminal stops to communicate by letter, as shown in Figure 7, its concrete steps are as follows:
Step 701: portable terminal A enters monitored state, and the kayser rigid order that mobile terminal receive B sends is set at locking state with self SIM card.
Step 702: the shutdown command that portable terminal A mobile terminal receive B sends enters closed condition.
It is to be noted, in Fig. 2~7 illustrated embodiments, after portable terminal A enters monitored state, all interacting messages that portable terminal A and portable terminal B carry out, on portable terminal A, do not show, portable terminal A does not store yet, and awares to avoid stealer that self has been monitored.
The structural representation of the portable terminal that Fig. 8 provides for the embodiment of the invention, as shown in Figure 8, it mainly comprises: monitoring sign memory module 81, monitored startup module 82 and monitored administration module 83, wherein:
Monitoring sign memory module 81: be used for storage monitoring sign.
Monitored startup module 82: receive the monitoring starting command that monitor terminal is sent, judge whether the monitoring sign in this order is marking matched with the monitoring of monitoring in the sign memory module 81, if enter monitored state indication to monitored administration module 83 transmissions.
Monitored administration module 83: receive the monitored state indication that enters that monitored startup module 82 sends, begin to accept the monitoring of monitor terminal.
In actual applications, monitored administration module 83 can be by following several frame modes of forming:
Structure one, form by number monitoring module 001 and monitored message transmission module 002, wherein:
Number monitoring module 001: be used to receive monitoring and start the monitored state indication that enters that module 82 sends, number management module 003 on this portable terminal sends the number change and reports order, number after the change that receiving number administration module 003 is sent, the number after monitored message transmission module 002 sends this change.
Monitored message transmission module 002: the number after the change that receiving number monitoring module 001 is sent sends to monitor terminal with this number.
Here, number management module 003 is the original function module on this portable terminal, receiving after number that number monitoring module 001 sends replaces with the order of reporting on one's mission, to change if detect the number of this portable terminal, the number after then will changing reports number monitoring module 001.
Structure two, form by owner of lost property's information monitoring module 011 and monitored message transmission module 012, wherein:
Owner of lost property's information monitoring module 011: the monitored state that enters that reception monitoring startup module 82 is sent is indicated, what receive that monitor terminal sends obtains owner of lost property's message command, from owner of lost property's information storage module 013 of this portable terminal, obtain owner of lost property's information, owner of lost property's information is sent to monitored message transmission module 012.
Monitored message transmission module 012: receive owner of lost property's information that owner of lost property's information monitoring module 011 is sent, owner of lost property's information is sent to monitor terminal.
Here, owner of lost property's information storage module 013 is the original function module on this portable terminal, and the information of preserving the owner of lost property is as telephone directory information, short message record, message registration etc.
In this structure, can also comprise personation short message processing module 014 in the monitored administration module 83: be used to receive the personation short message order that monitor terminal is sent, content of short message in this order is presented on the screen of this portable terminal, with the mobile terminal number of personation in the order as caller ID display on the screen of this portable terminal.
Structure three, form by owner of lost property's information deletion module 021, wherein:
Owner of lost property's information deletion module 021: be used to receive monitoring and start the monitored state indication that enters that module 82 sends, receive the deletion owner of lost property message command that monitor terminal is sent, send delete command to owner of lost property's information storage module 013 of this portable terminal.
Identical in owner of lost property's information storage module 013 in this structure and the structure two, and after receiving the delete command that owner of lost property's information deletion module 021 is sent deleted owner of lost property's information of self storage.
Structure four, form by subdistrict position monitoring module 031 and monitored message transmission module 032, wherein:
Subdistrict position monitoring module 031: receive monitoring and start the monitored state indication that enters that module 82 sends, what receive that monitor terminal sends obtains the subdistrict position order, and the location information of cell at this portable terminal place is sent to monitored message transmission module 032.
Monitored message transmission module 032: the location information of cell at this portable terminal place that reception subdistrict position monitoring module 031 is sent sends to monitor terminal with this location information of cell.
Structure five, get involved module 041 by short message and form, wherein:
Short message is got involved module 041: receive monitoring and start the monitored state indication 82 that enters that module sends, receive the short message that monitor terminal sends and get involved order, send the monitored order of carrying the monitor terminal number to the short message module 042 of this portable terminal.
Here, short message module 042 is the original function module of this portable terminal, and, receiving after short message gets involved the monitored order of carrying the monitor terminal number that module 041 sends, self there is short message to be about to send if detect, then the number with monitor terminal adds in the destination Mobile Station International ISDN Number of short message, so that short message is sent to monitor terminal.
Structure six, get involved module 051 by conversation and form, wherein:
Conversation gets involved module 051: receive monitoring and start the monitored state indication that enters that module 82 sends, receive the conversation that monitor terminal sends and get involved order, send the monitored order of carrying the monitor terminal number to the conversation module 052 of this portable terminal.
Here, conversation module 052 is the original function module of this portable terminal, and, receiving after conversation gets involved the monitored order of carrying the monitor terminal number that module 051 sends, if detecting this mobile phone users is dialing called number, then the number with monitor terminal adds in the destination Mobile Station International ISDN Number of message related to calls, so that message related to calls is sent to monitor terminal, and behind call through, this mobile phone users and called dialog context are transferred to monitor terminal.
Structure seven, form by SIM card monitoring module 061, wherein:
SIM card monitoring module 061: be used to receive monitoring and start the monitored state indication that enters that module 82 sends, receive the kayser rigid order that monitor terminal is sent, send locked order to the SIM card control module 062 of this portable terminal.
Here, SIM card control module 062 is the original function module of this portable terminal, and, after receiving the locked order that SIM card monitoring module 061 sends, be locked with the setting state of SIM card.
Structure eight, form by monitoring switch module 071, wherein:
Monitoring switch module 071: be used to receive monitoring and start the monitored state indication that enters that module 82 sends, receive the shutdown command that monitor terminal is sent, send shutdown command to the startup module 072 of this portable terminal.
Here, starting module 072 is the original function module of this portable terminal, and, after receiving the shutdown command that monitoring switch module 071 sends, close this portable terminal.
In actual applications, monitored administration module 83 can be made of in above-mentioned eight kinds of frame modes any one, also can be by any several the constituting in above-mentioned eight kinds of frame modes.
The monitor terminal of mentioning among the present invention can for portable terminal, personal computer (PC, PersonalComputer) etc.
The above only is process of the present invention and method embodiment, in order to restriction the present invention, all any modifications of being made within the spirit and principles in the present invention, is not equal to replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (7)

1. the method for a monitoring stolen mobile terminal is characterized in that, stolen mobile terminal is preserved the monitoring sign in advance, and this method comprises:
Stolen mobile terminal receives the monitoring starting command that monitor terminal is sent, judge whether the monitoring sign in this order is marking matched with the monitoring of self preserving, if coupling, enter monitored state, stolen mobile terminal receives that monitor terminal sends obtains owner of lost property's message command, and the owner of lost property's information that comprises telephone directory information of self storage is sent to monitor terminal;
Monitor terminal sends the order of personation short message to monitored terminal, the mobile terminal number of content of short message and personation is carried in this order, the mobile terminal number of described personation is included in the described telephone directory information and is the household of stealer or friend's number, stolen mobile terminal receives the personation short message order that monitor terminal is sent, content of short message is presented on the screen, with the mobile terminal number of personation as caller ID display on screen send for oneself friend or household so that stealer is thought this short message by mistake.
2. the method for claim 1 is characterized in that, described monitoring is designated password, perhaps is the sign of monitor terminal.
3. the method for claim 1 is characterized in that, the described monitoring of accepting monitor terminal comprises: the number that stolen mobile terminal detects self is replaced, and the number after changing is sent to monitor terminal.
4. the method for claim 1 is characterized in that, described owner of lost property's information further comprises: one or combination in any in short message record, the message registration.
5. the method for claim 1 is characterized in that, the described monitoring of accepting monitor terminal comprises:
Stolen mobile terminal receives the deletion owner of lost property message command that monitor terminal is sent, and deletes owner of lost property's information of self storing.
6. method as claimed in claim 5 is characterized in that, described owner of lost property's information comprises: the owner of lost property's telephone directory information, short message record and message registration.
7. the method for claim 1 is characterized in that, the described monitoring of accepting monitor terminal comprises:
Stolen mobile terminal receives that monitor terminal sends obtains the subdistrict position order, and the location information of cell at self place is sent to monitor terminal.
CN2007101796174A 2007-12-14 2007-12-14 Method for monitoring stolen mobile terminal and mobile terminal Active CN101184265B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2007101796174A CN101184265B (en) 2007-12-14 2007-12-14 Method for monitoring stolen mobile terminal and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2007101796174A CN101184265B (en) 2007-12-14 2007-12-14 Method for monitoring stolen mobile terminal and mobile terminal

Publications (2)

Publication Number Publication Date
CN101184265A CN101184265A (en) 2008-05-21
CN101184265B true CN101184265B (en) 2011-07-13

Family

ID=39449308

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2007101796174A Active CN101184265B (en) 2007-12-14 2007-12-14 Method for monitoring stolen mobile terminal and mobile terminal

Country Status (1)

Country Link
CN (1) CN101184265B (en)

Families Citing this family (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101330692A (en) * 2008-07-29 2008-12-24 Tcl天一移动通信(深圳)有限公司 Mobile phone with lose-proof function and method for preventing mobile phone from losing
CN102026371A (en) * 2010-12-29 2011-04-20 东莞宇龙通信科技有限公司 Terminal and positioning method thereof
CN102595359A (en) * 2012-03-13 2012-07-18 青岛海信移动通信技术股份有限公司 Method, device and system for locking remote control mobile terminal
CN103546507A (en) * 2012-07-12 2014-01-29 ***通信集团公司 Method, device and system for monitoring online state of terminal of internet-of-things system
CN102833712A (en) * 2012-08-31 2012-12-19 北京小米科技有限责任公司 Method, device, server and system for preventing information leakage and equipment
US9854444B2 (en) 2012-08-31 2017-12-26 Xiaomi Inc. Apparatus and methods for preventing information disclosure
CN103037371A (en) * 2012-12-10 2013-04-10 北京小米科技有限责任公司 Method and system of mobile terminal communication management
CN103634753A (en) * 2013-12-13 2014-03-12 北京奇虎科技有限公司 Information pushing method and information pushing client
CN103702331A (en) * 2013-12-13 2014-04-02 北京奇虎科技有限公司 Mobile terminal antitheft method and client
CN104834872A (en) * 2015-06-01 2015-08-12 上海斐讯数据通信技术有限公司 Mobile terminal antitheft control system and method
CN105634650B (en) * 2016-01-28 2018-12-11 广东欧珀移动通信有限公司 The self-protecting method and device of DSDS terminal based on GSM
CN105763727B (en) * 2016-02-16 2019-03-01 Oppo广东移动通信有限公司 Three mould DSDS mobile terminal guard methods and system
CN105979491A (en) * 2016-05-09 2016-09-28 北京邮电大学 SIM card remote control method, intelligent terminal and server
CN108961643A (en) * 2018-06-12 2018-12-07 深圳市中电数通智慧安全科技股份有限公司 A kind of parameter management method based on block chain, device and terminal device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1429043A (en) * 2001-12-28 2003-07-09 致福股份有限公司 Method for locking user's identification card and mobile telephone by using short message
CN1589044A (en) * 2004-08-23 2005-03-02 大唐微电子技术有限公司 Digital mobile phone with anti-rob and tracking function and its anti-rob and tracking method
CN1665260A (en) * 2005-02-24 2005-09-07 杭州斯达康通讯有限公司 A remote control method for mobile telephone
CN101039346A (en) * 2006-03-16 2007-09-19 上海晨兴电子科技有限公司 Handset anti-theft method, equipment and communication terminal having the same

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1429043A (en) * 2001-12-28 2003-07-09 致福股份有限公司 Method for locking user's identification card and mobile telephone by using short message
CN1589044A (en) * 2004-08-23 2005-03-02 大唐微电子技术有限公司 Digital mobile phone with anti-rob and tracking function and its anti-rob and tracking method
CN1665260A (en) * 2005-02-24 2005-09-07 杭州斯达康通讯有限公司 A remote control method for mobile telephone
CN101039346A (en) * 2006-03-16 2007-09-19 上海晨兴电子科技有限公司 Handset anti-theft method, equipment and communication terminal having the same

Also Published As

Publication number Publication date
CN101184265A (en) 2008-05-21

Similar Documents

Publication Publication Date Title
CN101184265B (en) Method for monitoring stolen mobile terminal and mobile terminal
CN100505905C (en) Mobile terminal and its safety monitoring method
CN101198119B (en) Automatic loss reporting method and portable terminal using the same
EP1510989B1 (en) Security monitor for PDA attached telephone
CN101141721B (en) Safety mobile telephone based communication custom
CN102447771B (en) The method of display caller information and the communication terminal of application the method
US8311511B2 (en) Data privacy on wireless communication terminal
CN103347131A (en) Intelligent mobile phone anti-theft method and system
CN101026822A (en) Method for protecting mobile phone private data
CN102158595A (en) Method and device for realizing burglary prevention of mobile terminal by face recognition
CN202617350U (en) Mobile phone safety management and control system
CN1407787A (en) Self-alarming and anti-theft method for mobile terminals
US8331917B2 (en) System and method for identifying a contact associated with an electronic communication
CN101895868A (en) Method for filtering fallacious message based on mobile phone
CN101409881A (en) Secrecy apparatus and method for mobile phone data
CN101720072B (en) System and method for realizing antitheft of mobile phone
CN102420852B (en) Server, mobile terminal and data synchronizing method
CN103067554B (en) A kind of terminal for supporting prompt operation
CN101877739A (en) Safe mobile phone and implementation method thereof
US20090111439A1 (en) System and method for monitoring a monitored mobile phone
CN102883032A (en) Method and device for intelligently managing address list
CN102665020A (en) Mobile terminal and antitheft method for same
CN1602096A (en) Method of backup of personal information lost in mobile terminal
CN101127996B (en) A power on key and power on method
CN100428831C (en) User data backup method based on network information terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CI01 Publication of corrected invention patent application

Correction item: Claims

Correct: The claim is correct

False: Claim error

Number: 28

Volume: 27

CI03 Correction of invention patent

Correction item: Claims

Correct: The claim is correct

False: Claim error

Number: 28

Page: Description

Volume: 27

ERR Gazette correction

Free format text: CORRECT: CLAIMS; FROM: CLAIMS WRONG TO: CLAIMS CORRECT

ASS Succession or assignment of patent right

Owner name: SHANXI ZHONGTIANXIN TECHNOLOGY CO., LTD.

Free format text: FORMER OWNER: BEIJING VIMICRO ELECTRONICS CO., LTD.

Effective date: 20121211

C41 Transfer of patent application or patent right or utility model
COR Change of bibliographic data

Free format text: CORRECT: ADDRESS; FROM: 100083 HAIDIAN, BEIJING TO: 030032 TAIYUAN, SHAANXI PROVINCE

TR01 Transfer of patent right

Effective date of registration: 20121211

Address after: 105, room 3, building 6, Kaiyuan street, Taiyuan economic and Technological Development Zone, Shanxi 030032, China

Patentee after: SHANXI ZHONGTIANXIN SCIENCE AND TECHNOLOGY CO.,LTD.

Address before: 100083, Haidian District, Xueyuan Road, Beijing No. 35, Nanjing Ning building, 15 Floor

Patentee before: VIMICRO Corp.

DD01 Delivery of document by public notice

Addressee: SHANXI ZHONGTIANXIN SCIENCE AND TECHNOLOGY CO.,LTD. Person in charge of patents

Document name: payment instructions

DD01 Delivery of document by public notice