[0025] The mobile terminal control system of the present invention is used to remotely control mobile terminals, including mobile phones, tablet computers, music players, etc., to protect the data stored in the mobile terminal from being easily lost, and to prevent the data stored in the mobile terminal from being stolen.
[0026] See figure 2 This embodiment has a remote control unit 22 installed in the cloud server 20 and a flashing protection unit 41 installed in the computer 40. The flashing protection unit 41 has a first flashing protection module 42 and a second flashing protection module 43. The remote control unit 22 A user information module 23, a forced data clearing module 24, a GPS data forced transmission module 25, and an alarm forced working module 26 are provided inside. In addition, the cloud server 20 is also provided with a memory 21 for storing personal data uploaded by the user.
[0027] The computer 40 can transmit data with the mobile terminal 30 through wireless transmission methods such as USB data cable or Bluetooth. The mobile terminal 30 is provided with a boot module 31 and a control unit 32. The boot module 31 starts running after the mobile terminal 30 is powered on. , And guide the operation of the control unit 32. In addition, the mobile terminal 30 is provided with a central processing unit, a storage device, etc., and the mobile terminal 30 is provided with a network card, which can perform wireless communication with the cloud server 40 through a wireless network.
[0028] Before the user performs a flashing operation on the mobile terminal 30, the mobile terminal 30 and the computer 40 need to be connected, that is, the mobile terminal 30 and the computer 40 can communicate. Such as image 3 As shown, when the computer 40 performs a flashing operation on the mobile terminal 30, it first reads a specific storage area in the storage device of the mobile terminal 30, that is, executes step S1, and then determines whether the mobile terminal 30 is the first flashing based on the read information, that is, Step S2 is executed. If it is determined that it is the first flashing, then step S3 is executed. The first flashing protection module 41 encrypts the physical network card address of the mobile terminal 30 and the serial number data of the storage device, and stores them in a specific storage area of the storage device of the mobile terminal 30 .
[0029] Therefore, in step S1, the computer 40 judges whether the mobile terminal 30 is the first flashing machine, as long as it detects whether the encrypted physical network card address and the serial number data of the storage device are stored in the specific storage area.
[0030] After step S3 is executed, the computer 40 performs a system refresh operation on the mobile terminal 30, that is, step S5 is executed to complete the work of refreshing.
[0031] If the computer 40 determines that the mobile terminal 30 is not flashing for the first time, that is, the mobile terminal 30 is flashing again, at this time, the flashing protection unit 42 executes step S4 to combine the data stored in the specific storage area of the mobile terminal 30 with the hardware information of the mobile terminal 30 For comparison, it is determined whether the physical network card address of the mobile terminal 30 is the same as the physical network card address stored in the specific storage area of the mobile terminal 30, and whether the storage device serial number data of the mobile terminal 30 is the same as the stored data, if any If it is not the same, it means that the hardware device of the mobile terminal 30 has been modified and the flashing operation is not performed. Only if it is determined that the hardware device data of the mobile terminal 30 is the same as the stored data, that is, it is determined that the hardware device of the mobile terminal 30 has not been illegally modified, step S5 can be executed to refresh the system.
[0032] Of course, in order to protect the mobile terminal 30 well, the modification authority of the hardware data of the mobile terminal 30 can be set. For example, the data in the specific storage area cannot be read and written by the user of the mobile terminal 30, and only users logged in the cloud server 20 can read, write, access and modify the data in the specific storage area of the mobile terminal 30 through the remote control unit 22. In this way, it can be ensured that only the real user of the mobile terminal 30 can modify the hardware device data of the mobile terminal 30, and prevent the mobile terminal 30 from being maliciously flashed and user data loss.
[0033] The storage unit 21 of the cloud server 20 stores the user's personal data, and the remote control unit 22 is provided with a user information module 23, which stores user information such as the user name and password for the user to log in to the cloud server 20, and also stores a number of mobile terminals The hardware information of 30 includes the physical network card address of the mobile terminal 30 and the serial number data of the storage device, and each user information is associated with the hardware information of the mobile terminal 30 of the user. In this way, after the user logs in to the cloud server 20, he can browse the hardware information of his multiple mobile terminals 30, and he can also modify the hardware information.
[0034] Therefore, the user can log in to the remote control unit 22 and input information such as the user name before flashing the machine. During the first flashing, the mobile terminal 30 uploads its hardware information to the remote control unit 22, including data including the mobile terminal's physical network card address and storage device serial number. The remote control unit 22 associates and stores these hardware information and user information.
[0035] The remote control unit 22 is also provided with a forced data clearing module 24, a GPS data forced transmission module 25, and an alarm forced working module 26. These modules work according to the instructions issued by the user after the remote user logs in to the remote control unit 22, and the above When the module is working, it sends a forced data clearing instruction, a GPS data forced transmission instruction, and an alarm forced working instruction to the mobile terminal 30 respectively. After the mobile terminal 30 is lost, the user can log in to the cloud server 20, and the remote control unit 22 sends the above instructions to the lost mobile terminal 30 to clear the data in the mobile terminal 30 in time to ensure that the data is not leaked, and can be timely The location of the mobile terminal 30 is found.
[0036] See Figure 4 After the mobile terminal 30 is powered on, it first runs the boot module, that is, executes step S11, and then performs hardware verification, that is, executes step S12. If the hardware verification is successful, then executes step S13, otherwise the operation ends.
[0037] In step S13, the guidance module 31 of the mobile terminal 30 determines whether it has received a forced data clearing instruction from the remote control unit 22. The forced data clearing instruction includes a forced clearing instruction for all data and a forced clearing instruction for user data. The forced clearing instruction for all data is required The mobile terminal 30 forcibly clears all data, including system data and user data. The user data forced clearing instruction only needs to clear the user data without processing the system data.
[0038] After the mobile terminal 30 receives the command of forcibly clearing all data, it executes step S14 to forcefully clear all the data, and exits the system after clearing. If the mobile terminal 30 does not receive all the data forcibly clearing instructions, step S14 is executed to run the control system 32, and the guidance module 31 transmits the received instructions to the control system 32, that is, step S15 is executed.
[0039] Then, the control system 32 determines whether a user data forced clearing instruction is received, that is, step S16 is executed. If a user data forced clearing instruction is received, step S17 is executed to force the user data stored in the mobile terminal 30 to be cleared. If the user data forced clearing instruction is not received, step S18 is executed to further determine whether a GPS data forced transmission instruction is received. If the instruction is received, step S19 is executed to run the GPS program in the background to obtain GPS data of the mobile terminal 30 and Upload to the cloud server 20. In this way, the cloud server 20 can determine the location of the mobile terminal 30 according to the received GPS data.
[0040] If the control unit 32 determines that the GPS data forced transmission instruction is not received, it executes step S20 to determine whether an alarm forced operation instruction is received, and if the instruction is received, executes step S21 to force the alarm operation of the mobile terminal 30 to operate. A sound is emitted on the mobile terminal 30 to facilitate the search of the mobile terminal 30.
[0041] Finally, if the control unit 32 judges that it has not received the above-mentioned instruction, it executes step S22 and runs normally, and when it is judged that the system exits the operation, that is, it executes step S23 and the judgment is yes, then ends the operation.
[0042] In order to ensure that the mobile terminal 30 can complete the information sent to the cloud server 20 in real time, it can be set that when the control unit 32 does not shake hands with the cloud server 20, the mobile terminal 30 will pop up a prompt window every specific time. In addition, the control unit 32 provides a back door that communicates with the remote control unit 22 to receive information sent by the remote control unit 22 in the background.
[0043] It can be seen that the remote control system can protect the data of the mobile terminal through the flashing protection unit and the remote control unit running on the cloud server, and can forcibly clear the data of the mobile terminal, avoid the leakage of personal data of the mobile terminal, and reduce the cost. Users cause trouble. In addition, it is convenient to locate the mobile terminal by forcing the mobile terminal to upload GPS data, and by forcing the alarm to work, it is convenient for the user to find the lost mobile terminal, which brings convenience to the user.
[0044] Of course, the above-mentioned embodiments are only preferred implementations of the present invention. In actual application, there can be more changes. For example, it can be set to require the user to log in to the cloud server and send permission information to the mobile terminal when re-wiping the phone; or, The hardware information of the mobile terminal is only stored in the remote control unit, not in the mobile terminal. Such a change can also achieve the purpose of the present invention.
[0045] Finally, it needs to be emphasized that the present invention is not limited to the above-mentioned embodiments. For example, changes in the type of mobile terminal, changes in hardware device information, including changes in quantity types, etc., should also be included in the protection scope of the claims of the present invention.