Computer theft preventing alarm system and method thereof
An anti-theft alarm and computer technology, applied in the computer field
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0017] like figure 1 As shown, a computer anti-theft alarm system includes an IP address acquisition module and an IP address short message sending module located in the computer; the IP address acquisition module is used to detect and obtain the IP address of the computer when the computer is turned on, and send The obtained IP address is transmitted to the IP address short message sending module, and the IP address short message sending module sends a short message to the mobile phone corresponding to the set mobile phone number.
Embodiment 2
[0019] like figure 2 Shown, a kind of computer anti-theft alarm method comprises the following steps:
[0020] 1) IP address acquisition step, for detecting and obtaining the IP address of the computer when the computer is turned on;
[0021] 2) The IP address short message sending step is to send the obtained IP address to the mobile phone corresponding to the set mobile phone number in the form of short message.
[0022] Further, before the step 1), it also includes a step of counting the number of wrong consecutive input of the power-on password, which is used to count whether the input error reaches the set threshold, and if step 1) is performed. If not, then step 1) and step 2) are not started, and the computer is directly turned on to enter the operating system and other application programs.
[0023] Further, when the computer is running, it also includes a computer data change judging step, if the judgment result is that the computer data is changed, then detect and...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 