CN101571895B - Theftproof method and system of portable computer device - Google Patents

Theftproof method and system of portable computer device Download PDF

Info

Publication number
CN101571895B
CN101571895B CN2008100966401A CN200810096640A CN101571895B CN 101571895 B CN101571895 B CN 101571895B CN 2008100966401 A CN2008100966401 A CN 2008100966401A CN 200810096640 A CN200810096640 A CN 200810096640A CN 101571895 B CN101571895 B CN 101571895B
Authority
CN
China
Prior art keywords
portable computer
computer device
hardware resources
resources table
information service
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN2008100966401A
Other languages
Chinese (zh)
Other versions
CN101571895A (en
Inventor
张安胜
庄中安
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Giga Byte Technology Co Ltd
Original Assignee
Giga Byte Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Giga Byte Technology Co Ltd filed Critical Giga Byte Technology Co Ltd
Priority to CN2008100966401A priority Critical patent/CN101571895B/en
Publication of CN101571895A publication Critical patent/CN101571895A/en
Application granted granted Critical
Publication of CN101571895B publication Critical patent/CN101571895B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Burglar Alarm Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to a theftproof method of a portable computer device. After the portable computer device is started, an integrated circuit of the portable computer device utilizes an interior network device to register user data into a data server, generates a hardware data list according to the sensing result of a basic input/output system and uploads the hardware data list to the data server, wherein the hardware data list also comprises an IP address and a status filed for displaying the using status of the portable computer device. When the status field of the hardware data list displays a stolen status, the integrated circuit starts a stolen display function to lock a screen of the portable computer device and carries out a corresponding operation so that the portable computer device can not carry out any operation.

Description

The theft preventing method of portable computer device and system
Technical field
The present invention is relevant for a kind of portable computer device, and is particularly to a kind of theft preventing method and system of portable computer device.
Background technology
Present portable computer device, for example, notebook computer, mini Mobile computer, personal digital assistant and the mobile phone that can surf the Net or the like, because price is not low, so usually be the object that is stolen, add that its volume is little and in light weight, also increase the success ratio of stealing.These portable computer devices are after being stolen, and the owner of lost property often has no idea to provide relevant stolen information for recovering computer.In addition, stealer also can be relied on the operating system of new installation portable computer device for support or change hardware device and avoid and pursueing and capture, and more increases the difficulty of recovering.
Summary of the invention
The technical problem to be solved in the present invention is: the computer apparatus information that how to obtain losing after portable computer device is lost reaches to be recovered fast.
Based on the problems referred to above, the invention provides a kind of theft preventing method of portable computer device.After one portable computer device started, an integrated circuit of this portable computer device utilized an internal network device of this portable computer device to be connected to an Information Service device by a network, and user's data is registered in this Information Service device.Utilize a basic input/output of this portable computer device to detect the hardware element of this portable computer device.This integrated circuit produces one first hardware resources table and uploads this second hardware resources table that this first hardware resources table to this Information Service device becomes one second hardware resources table or upgrades this Information Service device according to the detecting result, wherein this first and second hardware resources table also comprises employed IP address when this portable computer device links to this Information Service device, and this second hardware resources table more comprises a state field that shows this portable computer device user mode.When this state field of this first or second hardware resources table was shown as the state of having things stolen, then this integrated circuit made the user can't carry out any operation to this portable computer device startup one stolen Presentation Function with a screen that locks this portable computer device.
The present invention also provides a kind of burglary-resisting system of portable computer device, comprises an Information Service device and a portable computer device.This portable computer device also comprises a basic input/output, an internal network device and an integrated circuit.After this portable computer device started, this basic input/output was carried out hardware detection operation, to detect the plural hardware element of this portable computer device.This integrated circuit produces one first hardware resources table according to the detecting result of this hardware detection operation, utilize this internal network device and be connected to this Information Service device by a network, user's data is registered in this Information Service device, and upload this second hardware resources table that this first hardware resources table becomes one second hardware resources table or upgrades this Information Service device to this Information Service device, wherein this first and second hardware resources table also comprises employed IP address when this portable computer device links to this Information Service device, and this second hardware resources table also comprises a state field of the user mode that shows this portable computer device, and when this state field of this second hardware resources table is shown as the state of having things stolen, then this portable computer device is started a stolen Presentation Function and make the user can't carry out any operation with a screen that locks this portable computer device.
The present invention also provides a kind of computer recordable media, and in order to store a computer program, this computer program is used for being loaded in the computer system and makes computer system carry out a kind of theft preventing method.Wherein, this computer program comprises plural procedure code fragment.This theft preventing method is: after portable computer device starts, utilize a basic input/output of this portable computer device to detect the hardware element of this portable computer device.One integrated circuit of this portable computer device produces one first hardware resources table according to the detecting result, and be connected to an Information Service device by a network, upload this second hardware resources table that this first hardware resources table becomes one second hardware resources table or upgrades this Information Service device to this Information Service device.Wherein this first and second hardware resources table comprises that also this second hardware resources table also comprises a state field that shows this portable computer device user mode according to an IP address that links to this Information Service device gained.When this state field of this second hardware resources table is shown as the state of having things stolen, then starts a stolen Presentation Function and make the user can't carry out any operation with a screen that locks this portable computer device.
The technique effect that theft preventing method of the present invention and system can reach is: after portable computer device is stolen, initiatively provides available information giving lost article for change, even catch the burglar, allow stolen device is easier to be recovered.
Description of drawings
Figure 1A is the configuration diagram of the burglary-resisting system of the embodiment of the invention.
Figure 1B is the configuration diagram of the burglary-resisting system of another embodiment of the present invention.
Fig. 2 is the flow chart of steps of the portable computer device materials for registration of the embodiment of the invention.
Fig. 3 is the flow chart of steps of the theft preventing method of the embodiment of the invention.
Fig. 4 is the flow chart of steps of the theft preventing method of another embodiment of the present invention.
Fig. 5 is the transfer of the embodiment of the invention or the flow chart of steps of selling the materials for registration of portable computer device.
Wherein, description of reference numerals is as follows:
110~portable computer device
111~basic input/output
113~integrated circuit
114~hardware resources table
115~hardware element
117~internal network device
119~circumscribed network equipment
120~Information Service device
125~hardware resources table
Embodiment
The embodiment of the invention has disclosed a kind of theft preventing method and system of portable computer device.
Figure 1A is the configuration diagram of the burglary-resisting system of the embodiment of the invention.This burglary-resisting system comprises a portable computer device 110 and an Information Service device 120.Implement the inventive method, at first need one integrated circuit to be set in portable computer device 110 inside.Behind the electric power starting of portable computer device 110, the basic input/output 111 of portable computer device 110 can be carried out hardware detection operation, and make integrated circuit 113 write down the hardware element 115 that basic input/output 111 detects automatically, for example, CPU (central processing unit) identification code, medium access control address, hard disk model/sequence number, storer model/sequence number, notebook computer sequence number etc.Integrated circuit 113 produces a hardware resources table 114 according to the hardware element 115 that detects, and is stored in its Storage Media.
When portable computer device 110 is first the use, before entering operating system, integrated circuit 113 is by the network equipment 117 of portable computer device 110, automatically connect default Information Service device 120 in wireless or wired mode, in hardware resources table 114, add the IP address that portable computer device 110 is obtained, and automatically hardware resources table 114 is uploaded to Information Service device 120 and forms hardware resources table 125, simultaneously with user's data of portable computer device 110, as user's title and password, be registered in the Information Service device 120.Hardware resources table 125 also comprises a state field, and it is initially set " normally ", and expression portable computer device 110 is normally to be used by original owner.
When portable computer device 110 starts or the hardware of portable computer device 110 when change is arranged once more, integrated circuit 113 can be uploaded to Information Service device 120 with the hardware resources table 114 (comprising IP address and state field) that upgrades, and upgrade the hardware resources table 125 that is stored in the Information Service device 120, make portable computer device 110 and Information Service device 120 all have the latest hardware MSDS.
After portable computer device 110 was had things stolen, the user can utilize user's title and password, logins Information Service device 120 by another computer apparatus, changes to " having things stolen " with the state field with the hardware resources table 125 in the Information Service device 120.If stealer connects to network portable computer device 110, then integrated circuit 113 can upgrade the IP address in the hardware resources table 114, and the hardware resources table 114 that upgrades is uploaded to Information Service device 120, upgrading hardware resources table 125, and then learn that according to the state field of hardware resources table 125 portable computer device 110 is stolen stolen.
At this moment, integrated circuit 113 can start a stolen Presentation Function, can't carry out any operation with the screen of locking portable computer device 110, and make the stolen information of screen display of portable computer device 110, perhaps make the loudspeaker of portable computer device 110 continue to make a noise.In addition, the user can be learnt the position of portable computer device 110 by the IP address in the hardware resources table 125, and can understand the hardware change state according to the hardware information of record in the hardware resources table 125, with search assisting portable computer device 110.
After portable computer device 110 is recovered, the user can utilize user's title and password, login Information Service device 120 by another computer apparatus, the state field of hardware resources table 125 is changed to " normally ", and obtain the state field of hardware resources table 125 at integrated circuit 113 after, can remove stolen Presentation Function, normally use portable computer device 110.
When the user utilizes a circumscribed network equipment 119, shown in Figure 1B, connect to network, it may make hardware resources table 114 can't be uploaded to Information Service device 120 automatically.Therefore, when after portable computer device 110 installs operating system, the integrated circuit 113 of portable computer device 110 can be installed a default transmission procedure automatically, then work as portable computer device 110 and utilize a circumscribed network equipment to connect to network, integrated circuit 113 is uploaded to Information Service device 120 by this transmission procedure automatically with hardware resources table 114.
Network equipment 119 can be third generation network card, a PCMCIA (the Personal Computer Memory Card International Association) network card of interface, the network card of a USB interface or other compatible network equipment of a USB (universal serial bus) interface.
Integrated circuit 113 can be integrated into a conformability element with basic input/output 111.
When portable computer device 110 was transferred other user to, former user can utilize its user's title and password, logins Information Service device 120, to delete its materials for registration.New user is starting portable computer device 110, can link to Information Service device 120 its user's data of registration.
Fig. 2 is the flow chart of steps of the portable computer device materials for registration of the embodiment of the invention.
At first, when the user buys a portable computer device (step S21), after this portable computer device starts, make an integrated circuit of this portable computer device utilize an internal network device of this portable computer device automatically by a network, be connected to an Information Service device, and with user's data, as user's title and password, be registered in this Information Service device, and produce a hardware resources table of the hardware resources that comprises this portable computer device and upload this hardware resources table to this Information Service device (step S22) according to a basic input/output of this portable computer device detecting operation, wherein this hardware resources table comprises according to a world-wide web communications protocol address that links to this Information Service device gained.
Fig. 3 is the flow chart of steps of the theft preventing method of the embodiment of the invention.
After finishing the data registration, this portable computer device starts (step S31) once more, and this integrated circuit of this portable computer device produces a hardware resources table (step S32) according to the hardware element that basic input/output detected of this portable computer device, and this hardware resources table is called the first hardware resources table.This integrated circuit is judged this internal network device of this portable computer device whether can connect to network (step S33).If do not connect network, then continue to judge whether this internal network device can connect to network.If can connect to network, then this integrated circuit is sent to this Information Service device (step S34) via this internal network device with this first hardware resources table.At this moment, the previous hardware resources table that has been uploaded to this Information Service device is called the second hardware resources table.Wherein this second hardware resources table more comprises a state field.
Judge according to this state field in the second hardware resources table whether this portable computer device is that " " (step S35) has things stolen.As mentioned before, after this portable computer device was stolen, the user can utilize user's title and password, logins the Information Service device by another computer apparatus, changes to " having things stolen " with the state field with this second hardware resources table in this Information Service device.
If this state field of this second hardware resources table is " having things stolen ", then this integrated circuit starts a stolen Presentation Function (step S36), can't carry out any operation with the screen that locks this portable computer device, and the stolen information of the screen display that makes this portable computer device, perhaps make the loudspeaker of this portable computer device continue to make a noise, perhaps the burglar also can not do any action in order to avoid the agitation burglar in order to catch smoothly.When this portable computer device during still at starting state, this integrated circuit is every a set time, as 1 minute, send this first hardware resources table automatically to this Information Service device (step S37), continue then to judge whether this portable computer device is that " " (step S35) has things stolen.If the state field of this second hardware resources table is " normally ", then this integrated circuit is sent this first hardware resources table to this Information Service device (step S37) automatically every a set time, continues then to judge whether this portable computer device is that " " (step S35) has things stolen.
Fig. 4 is the flow chart of steps of the theft preventing method of another embodiment of the present invention.
After finishing the data registration, this portable computer device starts (step S41) once more, and this integrated circuit of this portable computer device produces a hardware resources table (step S42) according to the hardware element that basic input/output detected of this portable computer device, and this hardware resources table is called the first hardware resources table.This integrated circuit is judged this internal network device of this portable computer device whether can connect to network (step S43).If can connect to network, then this integrated circuit is sent to this Information Service device (step S44) via this internal network device with this first hardware resources table.
If can't connect to network, then this integrated circuit judges whether to install transmission procedure (step S45).If transmission procedure is not installed, then this integrated circuit is installed on the backstage and is left transmission procedure in its Storage Media (step S46) in, utilize an external network equipment to connect to network then, and utilize this transmission procedure that the first hardware resources table is sent to this Information Service device (step S47).If transmission procedure is installed, then utilizes an external network equipment to connect to network, and utilize this transmission procedure that the first hardware resources table is sent to this Information Service device (step S47).At this moment, the previous hardware resources table that has been uploaded to this Information Service device is called the second hardware resources table.
Judge according to this state field in the second hardware resources table whether this portable computer device is that " " (step S48) has things stolen.As mentioned before, after this portable computer device is stolen, the user can utilize user's title and password, logins this Information Service device by another computer apparatus, changes to " having things stolen " with this state field with this second hardware resources table in this Information Service device.
If this state field of this second hardware resources table is " having things stolen ", then this integrated circuit starts a stolen Presentation Function (step S49), can't carry out any operation with the screen that locks this portable computer device, and the stolen information of the screen display that makes this portable computer device perhaps makes the loudspeaker of this portable computer device continue to make a noise.When this portable computer device during still at starting state, this integrated circuit is every a set time, as 1 minute, send the first hardware resources table automatically to this Information Service device (step S50), continue then to judge whether this portable computer device is that " " (step S48) has things stolen.If this state field of this second hardware resources table is " normally ", then this integrated circuit is sent the first hardware resources table to this Information Service device (step S50) automatically every a set time, continues then to judge whether this portable computer device is that " " (step S48) has things stolen.
Fig. 5 is the transfer of the embodiment of the invention or the flow chart of steps of selling the materials for registration of portable computer device.
When user's desire this portable computer device is transferred or sold and give other people when using (step S51), former user can utilize its user's title and password, logins this Information Service device, to delete its materials for registration (step S52).New user after this portable computer device starts, this integrated circuit can automatic connecting to this Information Service device to register new user's data (step S53).
The present invention also provides a kind of recording medium, for example CD-RW discsCD-RW, disk and removable hard disk or the like, and it writes down the authority sign-off program that a computer-readable is got, so that carry out above-mentioned theft preventing method.At this, be stored in the authority sign-off program on the recording medium, basically formed by most procedure code fragments, for example set up organization chart procedure code fragment, sign-off list procedure code fragment, setting program chip segment and deployment program chip segment, and the function of these procedure code fragments corresponds to the step of said method and the functional block diagram of said system.

Claims (14)

1. the theft preventing method of a portable computer device is characterized in that, comprises the following steps:
One portable computer device utilizes a basic input/output of this portable computer device to detect the hardware element of this portable computer device after starting, and comprises the medium access control address;
One integrated circuit of this portable computer device produces one first hardware resources table according to the detecting result;
This integrated circuit is connected to an Information Service device by a network, and upload this second hardware resources table that this first hardware resources table becomes one second hardware resources table or upgrades this Information Service device to this Information Service device, wherein this first and second hardware resources table also comprises employed IP address when this portable computer device links to this Information Service device;
Wherein this second hardware resources table also comprises a state field that shows this portable computer device user mode; And
When this state field of this second hardware resources table was shown as the state of having things stolen, then this integrated circuit started a stolen Presentation Function to this portable computer device.
2. the theft preventing method of portable computer device as claimed in claim 1 is characterized in that, also comprises the following steps:
This integrated circuit judges whether an internal network device of this portable computer device can connect this network;
If this internal network device can connect this network, then this integrated circuit is sent to this Information Service device by this network with this first hardware resources table by this internal network device.
3. the theft preventing method of portable computer device as claimed in claim 2 is characterized in that, also comprises the following steps:
If this internal network device can't connect this network, then this integrated circuit judges whether to install a transmission procedure;
If this transmission procedure is not installed, then this integrated circuit is installed this transmission procedure on the backstage; And
If this transmission procedure is installed, then this integrated circuit utilizes an external network equipment to connect this network, and utilizes this transmission procedure that this first hardware resources table is sent to this Information Service device.
4. as the theft preventing method of claim 1,2 or 3 described portable computer devices, it is characterized in that, should can't carry out any operation for a screen that locks this portable computer device makes the user by stolen Presentation Function, and make the stolen information of this screen display of this portable computer device.
5. as the theft preventing method of claim 1,2 or 3 described portable computer devices, it is characterized in that, should can't carry out any operation for a screen that locks this portable computer device makes the user by stolen Presentation Function, and make the loudspeaker of this portable computer device continue to make a noise.
6. as the theft preventing method of claim 1,2 or 3 described portable computer devices, it is characterized in that this integrated circuit is sent this first hardware resources table of this portable computer device to this Information Service device automatically every a set time.
7. the theft preventing method of portable computer device as claimed in claim 6 is characterized in that, when this state field in this second hardware resources table was normal condition, then removing should stolen Presentation Function.
8. the burglary-resisting system of a portable computer device is characterized in that, comprising:
One Information Service device; And
One portable computer device, this portable computer device comprises:
One basic input/output, after this portable computer device started, it carried out hardware detection operation, to detect the plural hardware element of this portable computer device, comprises the medium access control address;
One network equipment; And
One integrated circuit, its detecting result according to this hardware detection operation produces one first hardware resources table, utilize this network equipment and be connected to this Information Service device by a network, user's data of this portable computer device is registered in this Information Service device, wherein this user's data is in order to confirm that this user's identity is for logining this Information Service device, and upload this second hardware resources table that this first hardware resources table becomes one second hardware resources table or upgrades this Information Service device to this Information Service device, wherein this first and second hardware resources table also comprises employed IP address when this portable computer device links to this Information Service device, and this second hardware resources table more comprises a state field, and when this state field of this second hardware resources table is shown as the state of having things stolen, then this portable computer device is started a stolen Presentation Function.
9. the burglary-resisting system of portable computer device as claimed in claim 8 is characterized in that, this network equipment is an internal network device;
When portable computer device after starting, this integrated circuit judges whether this internal network device of this portable computer device can connect this network, if this internal network device can connect this network, then this integrated circuit is sent to this Information Service device by this internal network device with this first hardware resources table.
10. the burglary-resisting system of portable computer device as claimed in claim 9, it is characterized in that if this internal network device can't connect to network, then this integrated circuit judges whether to install a transmission procedure, if this transmission procedure is not installed, this transmission procedure is installed on the backstage then; And
If this transmission procedure is installed, then utilizes an external network equipment to connect to network, and utilize this transmission procedure that this first hardware resources table is sent to this Information Service device.
11. burglary-resisting system as claim 8,9 or 10 described portable computer devices, it is characterized in that, should can't carry out any operation for a screen that locks this portable computer device makes the user by stolen Presentation Function, and make the stolen information of this screen display of this portable computer device.
12. burglary-resisting system as claim 8,9 or 10 described portable computer devices, it is characterized in that, should can't carry out any operation for a screen that locks this portable computer device makes the user by stolen Presentation Function, and make the loudspeaker of this portable computer device continue to make a noise.
13. the burglary-resisting system as claim 8,9 or 10 described portable computer devices is characterized in that, this integrated circuit is sent this first hardware resources table of this portable computer device to this Information Service device automatically every a set time.
14. the burglary-resisting system of portable computer device as claimed in claim 13 is characterized in that, when the state field in this second hardware resources table was normal condition, then removing should stolen Presentation Function.
CN2008100966401A 2008-04-30 2008-04-30 Theftproof method and system of portable computer device Active CN101571895B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2008100966401A CN101571895B (en) 2008-04-30 2008-04-30 Theftproof method and system of portable computer device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2008100966401A CN101571895B (en) 2008-04-30 2008-04-30 Theftproof method and system of portable computer device

Publications (2)

Publication Number Publication Date
CN101571895A CN101571895A (en) 2009-11-04
CN101571895B true CN101571895B (en) 2011-07-06

Family

ID=41231251

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2008100966401A Active CN101571895B (en) 2008-04-30 2008-04-30 Theftproof method and system of portable computer device

Country Status (1)

Country Link
CN (1) CN101571895B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI507913B (en) * 2014-01-29 2015-11-11 Wistron Corp Personal electronic device and data loss prevention system and method thereof

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101140608A (en) * 2007-10-09 2008-03-12 番禺得意精密电子工业有限公司 Computer anti-theft method

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101140608A (en) * 2007-10-09 2008-03-12 番禺得意精密电子工业有限公司 Computer anti-theft method

Also Published As

Publication number Publication date
CN101571895A (en) 2009-11-04

Similar Documents

Publication Publication Date Title
CN101578609B (en) Secure booting a computing device
CN101188656B (en) Information processing apparatus and control method thereof
US20070079141A1 (en) Information processing apparatus and method of controlling the same
CN102196021A (en) System for remotely erasing data, method, server, and mobile device thereof
JP2009146193A (en) Wireless communication terminal, method for protecting data of wireless communication terminal, program for having wireless communication terminal protect data, and recording medium storing the program
CN111400132B (en) Automatic monitoring method and system for on-shelf APP
CN106599115B (en) Data protection method, device and terminal
CN102117216A (en) Computer system and method capable of remotely restoring operating system
CN102750285B (en) system and method for providing offline browsing
CN103677512A (en) Mobile electronic device, and operation control method
CN101571895B (en) Theftproof method and system of portable computer device
CN102368852A (en) Information processing apparatus, information processing method and program
CN106254652A (en) The safety protecting method of terminal unit, Apparatus and system
CN107844318B (en) Upgrading method of operating system, mobile terminal and server
EP2110767B1 (en) Burglarproof method and system for portable computer devices
CN114661501A (en) Method and device for repairing abnormal starting-up
CN112433739A (en) Firmware upgrading method
CN106851623A (en) A kind of locking means of mobile terminal, device and mobile terminal
CN111984459A (en) Apple ID account removing method and system
KR102051613B1 (en) Analysis System and Method of iOS System Log
CN112667545A (en) Server asset information query management method
CN107346403B (en) Operation method and device of external memory and intelligent terminal
CN103677890A (en) Information processing apparatus, information processing method, and program
WO2007013176A1 (en) Information processing apparatus and pattern matching processing method
US20020152336A1 (en) System and method of installing a driver of an expansion card on a portable electronic device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant