CN106534516A - Intelligent mobile phone, theft tracking system and theft tracking method - Google Patents
Intelligent mobile phone, theft tracking system and theft tracking method Download PDFInfo
- Publication number
- CN106534516A CN106534516A CN201610954394.3A CN201610954394A CN106534516A CN 106534516 A CN106534516 A CN 106534516A CN 201610954394 A CN201610954394 A CN 201610954394A CN 106534516 A CN106534516 A CN 106534516A
- Authority
- CN
- China
- Prior art keywords
- mobile phone
- smart mobile
- module
- burgled
- robbed
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
- H04M1/72409—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
- H04M1/72412—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories using two-way short-range wireless interfaces
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B25/00—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
- G08B25/009—Signalling of the alarm condition to a substation whose identity is signalled to a central station, e.g. relaying alarm signals in order to extend communication range
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B25/00—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
- G08B25/01—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
- G08B25/016—Personal emergency signalling and security systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
- H04M1/72418—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality for supporting emergency services
- H04M1/72421—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality for supporting emergency services with automatic activation of emergency service functions, e.g. upon sensing an alarm
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72454—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to context-related or environment-related conditions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72463—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W64/00—Locating users or terminals or network equipment for network management purposes, e.g. mobility management
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Human Computer Interaction (AREA)
- Business, Economics & Management (AREA)
- Emergency Management (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Environmental & Geological Engineering (AREA)
- Computer Security & Cryptography (AREA)
- Telephone Function (AREA)
- Telephonic Communication Services (AREA)
Abstract
The invention relates to the field of communication and especially relates to a mobile phone anti-theft method. The invention discloses an intelligent mobile phone. The intelligent mobile phone comprises a navigation positioning module and a communication module, and further comprises an anti-theft mobile phone account bound with the intelligent mobile phone. When an anti-theft mobile phone account at a far end emits a stolen instruction to the intelligent mobile phone, the intelligent mobile phone starts the navigation positioning module and the communication module. The navigation positioning module is used for positioning longitude and latitude information of the intelligent mobile phone. The communication module used for sending the longitude and latitude information to the anti-theft mobile phone account. According to the invention, basic functions such as performing locking after theft, giving an alarm after the theft, performing whereabouts notification after the theft, making a data backup after the theft and deleting original data after the theft are provided for a theft tracking system.
Description
Technical field
Present patent application is related to the communications field, more particularly to a kind of technical scheme of anti-theft tracking of mobile phone.
Background technology
Mobile phone antitheft technology is a current very popular technology.As mobile phone is stored with substantial amounts of privacy information, connection
It is phone, log, memorandum, note, or implements with game provider, the account of propagation service supplier, password etc.
Binding, or has customized the time that do not limit, the calling of region and access service, or has cell entry, Lou Men, door, does
Public room door, safety cabinet, automobile, computer, " gate inhibition " open function of portable hard drive, once hand-set from stolen or loss, illegally
User may bring various losses and trouble to validated user.Therefore, Mobile phone antitheft technology has wide market prospect, it is expected to into
For the standard configuration of mobile phone.
With the improvement of people's living standards, the popularization more and more higher of mobile phone, the information stored in mobile phone are more and more important.
After the mobile phone of prior art is lost, cellphone subscriber is usually difficult to find what is returned.At present, general mobile phone do not possess it is antitheft,
Anti-lost, traceable function, even if it is also not sensitive enough to possess its reaction, therefore cannot accomplish and alarm informs that mobile phone is used
Person, can not carry out real time synchronization and accurate track and localization with getting back mobile phone, or even arrest thief.
Chinese Patent Application No. is CN201110369930.0, and the invention is related to a kind of antitheft mobile phone based on Bluetooth technology
Anti- loss alarming method, is wirelessly connected with the bluetooth of alarm including mobile phone is set up, and is arranged warning environmental information value, is reported to the police
Distance threshold Th, detects bluetooth signal intensity value RSSI, is believed according to received signal strength value RSSI and the warning environment
Breath value estimates the distance between mobile phone and alarm Dis, and when alarm distance threshold value Th is exceeded apart from Dis, triggering is reported to the police;This
Bright alarm distance considers environmental factorss so that report to the police more accurately, can need setting alarm distance according to user, enter one
Step ground, in the maximum transmission distance beyond Bluetooth signal, alarm or mobile phone can automatic detection triggering report to the police, and can be from
It is dynamic to obtain current phone GPS information and be regularly sent to the phone number for pre-setting, and further adopt two-way detection signal
The method of intensity, improves warning degree of accuracy..
Chinese Patent Application No. is CN201210089783.6, and the disclosure of the invention is a kind of to be based on mobile phone camera and GPS
Realize the system and method for antitheft mobile phone, including mobile phone CPU, microprocessor, webcam driver module, input module and unblock inspection
Module is surveyed, the input module is connected with unblock detection module, the unblock detection module is connected with mobile phone CPU, and mobile phone CPU leads to
Cross microprocessor to be connected with webcam driver module.Compared with prior art, beneficial effect is the present invention:What the present invention was provided
Mobile phone antitheft system and method are realized based on mobile phone camera and GPS, after losing or be stolen to mobile phone, is needed using during mobile phone
Unblock operation to be carried out, and triggering starts the running background program being built in mobile phone when faulty operation is unlocked, by handss
Machine GPS module, photographic head are positioned and are taken pictures to currently used person and found a view, while the information of acquisition is sent to user in time
The mailbox specified or other addresses, facilitate user to report to the police, so allow users to promptly and accurately recover mobile phone, prevent user's handss
Machine finance lose the problem with leakage of personal information..
Although patent disclosed above is directed to the warning and tracking of robbed or burgled mobile phone, it is not related in most most important mobile phone
Data backup technical problem.
The content of the invention
In order to solve the technical problem that above-mentioned prior art is present, the invention provides a kind of mobile phone based on intelligent watch
Anti-theft tracking technology, based on the binding between intelligent watch and mobile phone account, carries out Realtime Alerts using the intensity of Bluetooth signal,
Report to the police real-time trigger message synchronization module and GPS module, carry out it is important and can not Copy Info real-time synchronization, and enter line position
Confidence ceases real-time tracing, finally realizes antitheft mobile phone, synchronizing information and tracking.The present invention is to be achieved through the following technical solutions
's:
A kind of smart mobile phone, including navigation positioning module and communication module, also include anti-with smart mobile phone binding
Mobile phone account is stolen, such as described antitheft mobile phone account can be arranged on the network equipment (end);
When the antitheft mobile phone account of distal end sends robbed or burgled instruction to the smart mobile phone, the smart mobile phone start described in lead
Boat locating module and communication module;
The navigation positioning module, for positioning the latitude and longitude information of the smart mobile phone;
The communication module, for the latitude and longitude information is sent to the antitheft mobile phone account.
Further, described smart mobile phone, the smart mobile phone also include synchronizing information module, described information synchronization mould
Block, for the user data in the smart mobile phone is synchronized to by the communication module, the antitheft mobile phone account is specified to deposit
Storage space is put, and such as synchronous storage is on the network equipment.
Further, described smart mobile phone, the smart mobile phone also include lock machine module, the lock machine module, for root
According to the described robbed or burgled instruction for receiving, the smart mobile phone is locked.Can generate password locking temporarily, or be exactly only to lock
Fixed, only sending unlock instruction by antitheft mobile phone account could unlock.
Present invention also offers a kind of robbed or burgled tracing system:A kind of robbed or burgled tracing system based on smart mobile phone, the system
System includes the smart mobile phone and intelligent watch, is stored in the intelligent handss with the antitheft mobile phone account of smart mobile phone binding
In table, after the antitheft mobile phone account in the intelligent watch is logged in, remotely robbed or burgled instruction is sent to the smart mobile phone.
Because wrist-watch is worn on bracelet, it is not easy to which come off loss, and mobile phone is typically placed only in trousers pocket/pocket or pocket/pocket, and
Jing is often drawn out use, is easily lost or stolen.The binding of mobile phone and wrist-watch (by antitheft mobile phone account) is set, it is easier to
Find that mobile phone is robbed or burgled, avoid loss in time, especially immeasurable information/data/address list loss.
Further, described robbed or burgled tracing system, the intelligent watch also include Distance Judgment module, the Distance Judgment
Module, for the longitude and latitude letter for judging to be provided according to the respective navigation positioning module of the intelligent watch and the smart mobile phone
Breath, calculates the distance between the two.Can also lead to by the built-in blue-tooth device of intelligent watch and mobile phone and bluetooth communication agreement
Cross
Further, described robbed or burgled tracing system, the intelligent watch also include data and image analysis module, the number
According to and image analysis module, for the latitude and longitude information of smart mobile phone described in real time parsing.And then reality of the realization to robbed or burgled mobile phone
When follow the trail of.
Further, described robbed or burgled tracing system, the intelligent watch also include (long-range) control module, (long-range)
Control module, for remote control by the data syn-chronization in the smart mobile phone to the intelligent watch.Storage is provided with intelligent watch
Device.
Further, described robbed or burgled tracing system, (long-range) control module delete the smart mobile phone for remote control
In data.
Further, described robbed or burgled tracing system, (long-range) control module, for sending robbed or burgled alarm signal.Than
The information of " mobile phone of certain 139XXX is robbed or burgled " is such as sent to 110 robber and police centers, the longitude and latitude of the mobile phone can be further sent
Information gives 110 robber and police centers.
Present invention also offers a kind of robbed or burgled method for tracing of smart mobile phone, the smart mobile phone and intelligent watch are carried out
Match somebody with somebody, comprise the steps:
The latitude and longitude information of the smart mobile phone is interacted with the latitude and longitude information of the intelligent watch;
When the Distance Judgment module of the intelligent watch judges that the intelligent watch and the distance of the smart mobile phone exceed
During presetting threshold value, the Distance Judgment module by the antitheft mobile phone account bound with the smart mobile phone, remotely to institute
State smart mobile phone and send robbed or burgled instruction.
Further, the robbed or burgled method for tracing of smart mobile phone, (long-range) the control module remote control of the intelligent watch is by the intelligence
Data syn-chronization in energy mobile phone is to the intelligent watch.
Further, the robbed or burgled method for tracing of smart mobile phone, the time module of the intelligent watch judge the intelligent watch with
The synchronous time interval of the smart mobile phone, when the time module judges that the time interval is less than the time threshold,
Then not log-on data synchronic command.
Further, the robbed or burgled method for tracing of smart mobile phone, (long-range) the control module remote control of the intelligent watch delete described
Data in smart mobile phone.Prevent personal information from leaking, further loss is caused to former owner and is injured.
Further, the robbed or burgled method for tracing of smart mobile phone, (long-range) control module of the intelligent watch send robbed or burgled warning
Signal.The information of " mobile phone of certain 139XXX is robbed or burgled " is such as sent to 110 robber and police centers, the mobile phone can be further sent
Latitude and longitude information gives 110 robber and police centers.
The present invention one of at least has the advantages that:
1. instant invention overcomes former mobile phone is robbed or burgled, it is difficult to the technical problem given for change.
2. the present invention give robbed or burgled tracing system it is robbed or burgled after locking, it is robbed or burgled after report to the police, it is robbed or burgled after inform the basic of whereabouts
Function.
3. this invention greatly reduces the robbed or burgled rate of mobile phone, it is to avoid cause economic loss to owner.
4. the present invention can accomplish to allow smart mobile phone, it is robbed or burgled after back up out data, it is robbed or burgled after delete former data, it is to avoid to machine
Master causes further loss and injures.
5th, the robbed or burgled tracing system that the present invention is provided, reliability are high, while execution efficiency is high, applied range.
Description of the drawings
With reference to the accompanying drawings and detailed description the present invention is described in further detail:
Fig. 1 is smart mobile phone module diagram of the present invention;
Fig. 2 is first embodiment of the invention structural representation;
Fig. 3 is intelligent watch module diagram of the present invention;
Fig. 4 is second embodiment of the invention structural representation;
Fig. 5 is second embodiment of the invention schematic flow sheet;
Fig. 6 is third embodiment of the invention module diagram;
Fig. 7 is third embodiment of the invention schematic flow sheet.
Description of reference numerals
Smart mobile phone -100, navigation positioning module -110, communication module -120, (information) synchronization module -130, lock machine mould
Block -140;Intelligent watch -200, navigation positioning module -210, communication module -220, (information) synchronization module -230, control mould
Block -240, data and image analysis module -250, Distance Judgment module -260, time module -270, alarm device -280, storage
Device -290;The network equipment -300.
Specific embodiment
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
Accompanying drawing to be used needed for having technology description is briefly described, it should be apparent that, below explanation and accompanying drawing are for the present invention
Be it is exemplary, and be understood not to limit the present invention.Following description describe numerous details to facilitate to this
Sensible solution.However, in some instances, well known or conventional details is not simultaneously specified, the requirement succinct to meet description.
In one typical computing hardware configuration of the application, client/terminal, the network equipment and trusted party include one
Individual or multiple processors (CPU), input/output interface, network interface and internal memory.
Client, mobile terminal or the network equipment in the present invention includes processor, processes containing single core processor or multinuclear
Device.Processor is alternatively referred to as one or more microprocessors, CPU (CPU) etc..More specifically, processor can be
Complicated instruction set calculates (CISC) microprocessor, Jing Ke Cao Neng (RISC) microprocessor, very long instruction word (VLIW)
Microprocessor, the processor for realizing other instruction set, or realize the processor of instruction set combination.Processor can also be one or many
Individual application specific processor, such as special IC (ASIC), field programmable gate array (FPGA), digital signal processor
(DSP), network processing unit, graphic process unit, network processing unit, communication processor, cipher processor, coprocessor, embedded
Processor or be capable of process instruction any other type logical block.Processor is used to perform the behaviour discussed by the present invention
Make the instruction with step.
Client, mobile terminal or the network equipment in the present invention includes memorizer, for storing big data, it may include one
It is individual or multiple volatile storage devices, such as random access memory (RAM), dynamic ram (DRAM), synchronous dram (SDRAM), quiet
State RAM (SRAM) or other kinds of storage device.Memorizer can be stored including being performed by processor or any other equipment
The information of job sequence.For example, several operation systems, device driver, firmware (for example, input and output fundamental system or
) and/or the executable code and/or data of application program can be loaded in memory and by computing device BIOS.
The operating system of client, mobile terminal or the network equipment in the present invention can be any kind of operating system,
Windows, Windows Phone of such as Microsoft, Apple IOS, the Android of Google, and Linux,
Unix operating systems or other real-time or embedded OS VxWorks etc..
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
Accompanying drawing to be used needed for having technology description is briefly described, it should be apparent that, below explanation and accompanying drawing are for the present invention
Be it is exemplary, and be understood not to limit the present invention.Following description describe numerous details to facilitate to this
Sensible solution.However, in some instances, well known or conventional details is not simultaneously specified, the requirement succinct to meet description.This
The equipment and control method of invention is referring to following embodiments:
First embodiment
If Fig. 1 is shown in smart mobile phone module diagram of the present invention, Fig. 2 first embodiment of the invention structural representations:
A kind of smart mobile phone 100, including navigation positioning module 110 and communication module 120, also includes and the smart mobile phone
The antitheft mobile phone account of binding, such as described antitheft mobile phone account can be arranged on the network equipment (end) 300;
When the antitheft mobile phone account of distal end sends robbed or burgled instruction to the smart mobile phone 100, the smart mobile phone starts institute
State navigation positioning module 110 and communication module 120;
The navigation positioning module 110, for positioning the latitude and longitude information of the smart mobile phone;
The communication module 120, for the latitude and longitude information is sent to the antitheft mobile phone account.
Preferably, described smart mobile phone, the smart mobile phone 100 also include (information) synchronization module 130, (letter
Breath) synchronization module 130, it is described anti-for the user data in the smart mobile phone 100 is synchronized to by the communication module
Mobile phone account designated storage location is stolen, such as synchronous storage is on the network equipment 300.
Preferably, described smart mobile phone, the smart mobile phone 100 also include lock machine module 140, the lock machine module,
For according to the described robbed or burgled instruction for receiving, locking the smart mobile phone 100.Can generate password locking temporarily;Or
Only just it is locked out, only sending unlock instruction by antitheft mobile phone account could unlock.
Second embodiment
On the basis of embodiment one, there is provided a kind of robbed or burgled tracing system:As Fig. 3 shows for intelligent watch module of the present invention
It is intended to, Fig. 4 is shown in second embodiment of the invention structural representation:
A kind of robbed or burgled tracing system based on smart mobile phone, the system include the smart mobile phone 100 and intelligent watch
200, it is stored in the intelligent watch 200 with the antitheft mobile phone account of the binding of the smart mobile phone 100, when the login intelligence
After the antitheft mobile phone account in wrist-watch 200, remotely robbed or burgled instruction is sent to the smart mobile phone 100.Because wrist-watch is worn
In wrist, it is not easy to which come off loss, and mobile phone is typically placed only in trousers pocket/pocket or pocket/pocket, and Jing is often drawn out and made
With easily loss or stolen.The binding of mobile phone and wrist-watch (by antitheft mobile phone account) is set, it is easier to find mobile phone in time
It is robbed or burgled, avoid loss, especially immeasurable information/data/address list loss.
Preferably, described robbed or burgled tracing system, the intelligent watch 200 also include Distance Judgment module 260, it is described away from
From judge module, for judging according to the intelligent watch and the smart mobile phone longitude and latitude that each navigation positioning module is provided
Information, calculates the distance between the two.
Preferably, described robbed or burgled tracing system, the intelligent watch also include data and image analysis module 250, institute
Data and image analysis module are stated, for the latitude and longitude information of smart mobile phone described in real time parsing.And then realize to robbed or burgled mobile phone
Real-time tracing.
Preferably, described robbed or burgled tracing system, the intelligent watch also include (long-range) control module 240, described (remote
Journey) control module, for remote control by the data syn-chronization in the smart mobile phone to the intelligent watch.It is provided with intelligent watch and deposits
Reservoir.
Preferably, described robbed or burgled tracing system, (long-range) control module 240 delete the intelligence for remote control
Data in mobile phone.
Preferably, described robbed or burgled tracing system, (long-range) control module 240, for sending robbed or burgled alarm signal.
The information of " mobile phone of certain 139XXX is robbed or burgled " is such as sent to 110 robber and police centers, the longitude and latitude of the mobile phone can be further sent
Degree information gives 110 robber and police centers.
The present embodiment additionally provides a kind of robbed or burgled method for tracing of smart mobile phone, and such as Fig. 5 is second embodiment of the invention flow process
Shown in schematic diagram:The smart mobile phone and intelligent watch are matched, and are comprised the steps:
S100:The latitude and longitude information of the smart mobile phone is interacted with the latitude and longitude information of the intelligent watch;
S200:When the Distance Judgment module 260 of the intelligent watch judges the intelligent watch with the smart mobile phone
When distance exceedes presetting threshold value, the Distance Judgment module by the antitheft mobile phone account bound with the smart mobile phone,
Remotely robbed or burgled instruction is sent to the smart mobile phone.
Preferably, the robbed or burgled method for tracing of smart mobile phone, S300:(long-range) the control module remote control of the intelligent watch is by institute
State in the memorizer 290 of the data syn-chronization to the intelligent watch in smart mobile phone.
It is further preferred that the robbed or burgled method for tracing of smart mobile phone, S250:The time module 270 of the intelligent watch judges
The intelligent watch time interval synchronous with the smart mobile phone, when the time module judges that the time interval is less than institute
When stating time threshold, then not log-on data synchronic command.
Preferably, the robbed or burgled method for tracing of smart mobile phone, S400:240 remote control of (long-range) control module of the intelligent watch
Delete the data in the smart mobile phone.Prevent personal information from leaking, further loss is caused to former owner and is injured.
Preferably, the robbed or burgled method for tracing of smart mobile phone, S500:(long-range) control module 240 of the intelligent watch sends
Robbed or burgled alarm signal.The information of " mobile phone of certain 139XXX is robbed or burgled " is such as sent to 110 robber and police centers, can further be sent
The latitude and longitude information of the mobile phone gives 110 robber and police centers.
3rd embodiment
A kind of antitheft mobile phone of offer of the present embodiment the systems technology followed the trail of, can be by wrist-watch 200 and mobile phone 100
The strong and weak of bluetooth real-time communication signal is realized reporting to the police, and realizes real time synchronization by synchronizing information module, by built-in GPS
Module accurately obtains the geographical position of stolen mobile phone.
Current mobile phone does not possess antitheft and tracking function substantially, and generally mobile phone once leave human body certain limit very
It is possible to lose or stolen.Current only Mobile phone burglar alarm, needs are external, and not only antitheft insensitive, positioning is inaccurate, letter
Breath synchronously can not retain, and affect attractive in appearance.
The present invention realizes antitheft, the tracking of mobile phone based on intelligent watch, by bluetooth real-time communication signal monitoring, by report
Alarm device 280 realizes Realtime Alerts, while realizing that real time synchronization and GPS module are obtained in real time by synchronizing information module
The geographical position of stolen mobile phone, and wrist-watch end is sent to, and then quickly recover stolen mobile phone.
The modular structure of the present embodiment is the method for the present invention shown in third embodiment of the invention module diagram such as Fig. 6
It is described as follows:
A, bluetooth communication real time signal processing;
B, anti-theft tracking are opened in real time;
C, recalls information synchronization module realize information real-time synchronization and self-destruction;
D, calls built-in GPS module gain-of-function mobile phone current location;
Mobile phone current location information is pushed to intelligent watch by E;
F, synchronization process.
For current phone anti-theft tracking technology the drawbacks of, be to realize preferably protection mobile phone and personal information, this
It is bright to disclose a kind of anti-theft tracking of mobile phone technology based on intelligent watch, divulged a secret with preferably preventing and treating personal information.If Fig. 7 is this
Shown in bright 3rd embodiment schematic flow sheet, including following device and key step:First, by intelligent watch and mobile phone
Built-in blue-tooth device and bluetooth communication agreement, distance therebetween is parsed by mutually parsing bluetooth signal intensity,
And following real-time operation is carried out by seeing if fall out set communication distance threshold value:
Judge by Distance Judgment module 260, beyond communication distance threshold value, wrist-watch end sends alarm signal in real time, notify
User;
Beyond communication distance threshold value, the synchronizing information and self-destruction module of intelligent watch and mobile phone terminal are waken up in real time, if one
Determine synchronizing information is then carried out in scope, and while judged according to lock in time last time, by time module 270, if distance
Last lock in time then judges without synchronization less than time threshold, judges quickly to carry out relevant information if beyond time threshold
Real-time data synchronization;Go beyond the scope, enter row information self-destruction protection.Can either so ensure can not Copy Info reservation, and
Personal account information etc. can be protected;
Beyond communication distance threshold value, after intelligent watch sends alarm signal, waking up can only wrist-watch and mobile phone two ends
GPS module, the GPS module for calling two ends built-in obtain the geographical position of current phone, and the positional information is sent to intelligence
Wrist-watch end, intelligent watch section passes through data and image analysis obtain the geographical position of mobile phone in real time, and then realizes the reality to mobile phone
When follow the trail of.
The present invention is simple to operate, safe and reliable, and real time synchronization is strong;Combine with remote control function, prevent mobile phone
Loss, preserve it is important can not Copy Info personal information leakage.
1) threshold value is arranged by bluetooth communication signal intensity, in wrist-watch end real-time monitoring;
2) by information real-time synchronization module, alarm signal send and meanwhile carry out it is important and can not Copy Info guarantor
Stay, the self-destruction of account information, to preserve and protect personal information;
3) obtain the positional information of other side by GPS module mobile phone and intelligent watch in real time, intelligent watch end can be by
Data and image analysis carry out real-time tracing to mobile phone.
The present embodiment is reported to the police and GPS real-time positioning double shields using Bluetooth signal detection, by wrist-watch and the indigo plant of mobile phone
The strong and weak of tooth real-time communication signal is realized reporting to the police, and realizes real time synchronization and self-destruction by synchronizing information module, by built-in
GPS module accurately obtain the geographical position of stolen mobile phone, preferably real-time protection hand-set from stolen or can recover, and while
Userspersonal information is preserved and protected.
It is obvious to a person skilled in the art that the invention is not restricted to the details of above-mentioned one exemplary embodiment, Er Qie
In the case of spirit or essential attributes without departing substantially from the present invention, the present invention can be realized in other specific forms.Therefore, no matter
From the point of view of which point, embodiment all should be regarded as exemplary, and be nonrestrictive, the scope of the present invention is by appended power
Profit is required rather than described above is limited, it is intended that all in the implication and scope of the equivalency of claim by falling
Change is included in the present invention.Any reference in claim should not be considered as and limit involved claim.This
Outward, it is clear that " including ", a word was not excluded for other units or step, and odd number is not excluded for plural number.That what is stated in device claim is multiple
Unit or device can also be realized by software or hardware by a unit or device.The first, the second grade word is used for table
Show title, and be not offered as any specific order.
Claims (12)
1. a kind of smart mobile phone, including navigation positioning module and communication module, it is characterised in that also include and the smart mobile phone
The antitheft mobile phone account of binding,
When antitheft mobile phone account sends robbed or burgled instruction to the smart mobile phone, the smart mobile phone starts the navigation positioning module
And communication module;
The navigation positioning module, for positioning the latitude and longitude information of the smart mobile phone;
The communication module, for the latitude and longitude information is sent to the antitheft mobile phone account.
2. smart mobile phone according to claim 1, it is characterised in that the smart mobile phone also includes synchronizing information module,
Described information synchronization module, it is described antitheft for the user data in the smart mobile phone is synchronized to by the communication module
Mobile phone account designated storage location.
3. smart mobile phone according to claim 2, it is characterised in that the smart mobile phone also includes lock machine module, described
Lock machine module, for according to the described robbed or burgled instruction for receiving, locking the smart mobile phone.
4. a kind of robbed or burgled tracing system based on smart mobile phone as claimed in claim 1, the system also include intelligent watch,
Characterized in that, be stored in the intelligent watch with the antitheft mobile phone account of smart mobile phone binding, when the login intelligence
After the antitheft mobile phone account in energy wrist-watch, robbed or burgled instruction is sent to the smart mobile phone.
5. robbed or burgled tracing system according to claim 4, it is characterised in that the intelligent watch also includes Distance Judgment mould
Block, the Distance Judgment module, for judging the distance of the intelligent watch and the smart mobile phone.
6. robbed or burgled tracing system according to claim 5, it is characterised in that the intelligent watch also includes data and image
Parsing module, the data and image analysis module, for the latitude and longitude information of smart mobile phone described in real time parsing.
7. robbed or burgled tracing system according to claim 4, it is characterised in that the intelligent watch also includes control module,
The control module, for remote control by the data syn-chronization in the smart mobile phone to the intelligent watch.
8. robbed or burgled tracing system according to claim 7, it is characterised in that the control module, deletes institute for remote control
State the data in smart mobile phone.
9. the robbed or burgled method for tracing of a kind of smart mobile phone, the smart mobile phone and intelligent watch are matched, it is characterised in that included
Following steps:
The latitude and longitude information of the smart mobile phone is interacted with the latitude and longitude information of the intelligent watch;
Preset when the Distance Judgment module of the intelligent watch judges that the intelligent watch is exceeded with the distance of the smart mobile phone
During fixed threshold value, the Distance Judgment module by the antitheft mobile phone account bound with the smart mobile phone, to the intelligent handss
Machine sends robbed or burgled instruction.
10. according to the robbed or burgled method for tracing of claim 9 smart mobile phone, it is characterised in that the control module of the intelligent watch is distant
Control is by the data syn-chronization in the smart mobile phone to the intelligent watch.
11. according to the robbed or burgled method for tracing of claim 10 smart mobile phone, it is characterised in that the time module of the intelligent watch is sentenced
The disconnected intelligent watch time interval synchronous with the smart mobile phone, when the time module judges that the time interval is less than
During the time threshold, then not log-on data synchronic command.
12. according to the robbed or burgled method for tracing of claim 9 smart mobile phone, it is characterised in that the control module of the intelligent watch is distant
The data in the smart mobile phone are deleted in control.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610954394.3A CN106534516A (en) | 2016-10-27 | 2016-10-27 | Intelligent mobile phone, theft tracking system and theft tracking method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610954394.3A CN106534516A (en) | 2016-10-27 | 2016-10-27 | Intelligent mobile phone, theft tracking system and theft tracking method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106534516A true CN106534516A (en) | 2017-03-22 |
Family
ID=58325496
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610954394.3A Pending CN106534516A (en) | 2016-10-27 | 2016-10-27 | Intelligent mobile phone, theft tracking system and theft tracking method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106534516A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107017909A (en) * | 2017-05-26 | 2017-08-04 | 苏州科盈思电子科技有限公司 | wireless finger ring |
CN107222832A (en) * | 2017-05-17 | 2017-09-29 | 杭州魔猫科技有限公司 | A kind of geo-fencing system of charger baby |
CN109409144A (en) * | 2018-09-03 | 2019-03-01 | 平安科技(深圳)有限公司 | Terminal alarms method, apparatus, computer equipment and storage medium |
CN114363452A (en) * | 2021-12-31 | 2022-04-15 | 湖南工学院 | Smart phone anti-theft and tracking method based on somatosensory interaction |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002186022A (en) * | 2000-12-08 | 2002-06-28 | Nippon Denki Information Technology Kk | Wearable terminal system |
CN1992746A (en) * | 2005-12-28 | 2007-07-04 | 集嘉通讯股份有限公司 | Data backup and reduction method |
CN102663868A (en) * | 2012-04-18 | 2012-09-12 | 李曙胜 | Security protection realizing method and system of mobile intelligent terminal |
CN105430178A (en) * | 2015-11-05 | 2016-03-23 | 上海斐讯数据通信技术有限公司 | Wristband, mobile terminal and security information processing method and system thereof, and communication system |
CN105993162A (en) * | 2015-09-23 | 2016-10-05 | 深圳还是威健康科技有限公司 | Method of preventing losing terminal and smart band |
-
2016
- 2016-10-27 CN CN201610954394.3A patent/CN106534516A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002186022A (en) * | 2000-12-08 | 2002-06-28 | Nippon Denki Information Technology Kk | Wearable terminal system |
CN1992746A (en) * | 2005-12-28 | 2007-07-04 | 集嘉通讯股份有限公司 | Data backup and reduction method |
CN102663868A (en) * | 2012-04-18 | 2012-09-12 | 李曙胜 | Security protection realizing method and system of mobile intelligent terminal |
CN105993162A (en) * | 2015-09-23 | 2016-10-05 | 深圳还是威健康科技有限公司 | Method of preventing losing terminal and smart band |
CN105430178A (en) * | 2015-11-05 | 2016-03-23 | 上海斐讯数据通信技术有限公司 | Wristband, mobile terminal and security information processing method and system thereof, and communication system |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107222832A (en) * | 2017-05-17 | 2017-09-29 | 杭州魔猫科技有限公司 | A kind of geo-fencing system of charger baby |
CN107222832B (en) * | 2017-05-17 | 2018-05-08 | 杭州魔猫科技有限公司 | A kind of geo-fencing system of charger baby |
CN107017909A (en) * | 2017-05-26 | 2017-08-04 | 苏州科盈思电子科技有限公司 | wireless finger ring |
CN109409144A (en) * | 2018-09-03 | 2019-03-01 | 平安科技(深圳)有限公司 | Terminal alarms method, apparatus, computer equipment and storage medium |
CN114363452A (en) * | 2021-12-31 | 2022-04-15 | 湖南工学院 | Smart phone anti-theft and tracking method based on somatosensory interaction |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8902066B2 (en) | Alert for real-time risk of theft or loss | |
EP2115953B1 (en) | Apparatus and methods for locating, tracking and/or recovering a wireless communication device | |
CN106534516A (en) | Intelligent mobile phone, theft tracking system and theft tracking method | |
US20100273452A1 (en) | Apparatus and Methods For Locating Tracking and/or Recovering a Wireless Communication Device | |
US20080108370A1 (en) | System and Method for Tracking, Monitoring, Collecting, Reporting and Communicating with the Movement of Individuals | |
CN106558206A (en) | A kind of portable anti-lost method based on active RFID technology | |
US20090251318A1 (en) | Anti-theft system of mobile device | |
US9609119B2 (en) | Disablement of lost or stolen device | |
CA2607236C (en) | System and method for tracking, monitoring, communicating and responding to the movement of individuals and assets | |
CN105929429A (en) | Tracker for preventing loss of objects | |
CN105282700A (en) | Tracking method, tracking server, and tracking system | |
CN109275089A (en) | Smart phone watch and method for improving personal safety | |
CN201314171Y (en) | Anti-theft code case | |
CN100502599C (en) | Security management method for mobile phone | |
TWI711319B (en) | Block chain-based smart alarm method and device, and electronic equipment | |
WO2013072774A2 (en) | Systems and methods for recovering low power devices | |
CN1404703A (en) | Method and apparatus for securing a mobile electronic device based on location | |
KR20230012086A (en) | Safety check service method using smart device | |
US20150223019A1 (en) | System and method for tracking assets | |
CN103945325A (en) | Mobile phone anti-theft and tracking system based on J2EE and Android platform | |
CN109451024B (en) | Power grid resource data updating mobile operation terminal protection method based on Beidou system | |
US20150310716A1 (en) | System and method for preventing loss of asset | |
CN113114741A (en) | Secret communication system in electronic payment network system | |
CN110086942B (en) | Anti-theft method, device and equipment of intelligent terminal and storage medium | |
Silva et al. | WeDoCare: A system for vulnerable social groups |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20170322 |
|
WD01 | Invention patent application deemed withdrawn after publication |