System and method for remotely controlling mobile terminal

A technology for remote control systems and mobile terminals, applied in electrical components, wireless communication, network data management, etc., can solve the problems of data control of non-mobile terminals, easy data theft, inappropriate use of personal information, etc., to achieve protection Safe, avoid the effects of improper deletion

Active Publication Date: 2012-03-14
深圳芯智汇科技有限公司
4 Cites 18 Cited by

AI-Extracted Technical Summary

Problems solved by technology

[0005] However, since the cloud server 10 passively receives uploaded data or sends requested data to the mobile terminal, it does not actively protect the data, let alone control the data of the mobile terminal.
Once the mobile terminal is stolen, it is possible to replace the hardware, such as replacing the network card and storage device of the mobile terminal, and perform a flashing operation, that is, to perform a s...
View more

Method used

It can be seen that the remote control system can protect the data of the mobile terminal by brushing the protection unit and the remote control unit running on the cloud server, and can forcefully clear the data of the mobile terminal to avoid the leakage of personal data of the mobile termin...
View more

Abstract

The invention provides a system and method for remotely controlling a mobile terminal. The system comprises a machine refreshing protection unit which includes a first machine refreshing protection module for encrypting address data of a physic network card of a mobile terminal and serial number data of a storage device and storing the encrypted data in a special storage region of the mobile terminal when the mobile terminal is determined to be refreshed for the first time; and the machine refreshing protection unit is also provided with a second machine refreshing protection module for allowing refreshing operation after the mobile terminal is judged to be refreshed for the second time and when the data of the physic network card of the mobile terminal and the serial number data of the storage device are judged to be consistent with the data stored in the special storage region. The method comprises the steps of: after receiving a machine refreshing command of the mobile terminal, judging if the mobile terminal is refreshed for the first time; if so, storing hardware information of the mobile terminal in the special storage region; if the mobile terminal is refreshed for the second time, allowing the refreshing operation when the hardware information is judged to be consistent with the stored information. The system and method for remotely controlling the mobile terminal, disclosed by the invention, can improve safety of personal data stored in the mobile terminal and cloud end servers.

Application Domain

Network data management

Technology Topic

Individual dataInformation storage +5

Image

  • System and method for remotely controlling mobile terminal
  • System and method for remotely controlling mobile terminal
  • System and method for remotely controlling mobile terminal

Examples

  • Experimental program(1)

Example Embodiment

[0025] The mobile terminal control system of the present invention is used to remotely control mobile terminals, including mobile phones, tablet computers, music players, etc., to protect the data stored in the mobile terminal from being easily lost, and to prevent the data stored in the mobile terminal from being stolen.
[0026] See figure 2 This embodiment has a remote control unit 22 installed in the cloud server 20 and a flashing protection unit 41 installed in the computer 40. The flashing protection unit 41 has a first flashing protection module 42 and a second flashing protection module 43. The remote control unit 22 A user information module 23, a forced data clearing module 24, a GPS data forced transmission module 25, and an alarm forced working module 26 are provided inside. In addition, the cloud server 20 is also provided with a memory 21 for storing personal data uploaded by the user.
[0027] The computer 40 can transmit data with the mobile terminal 30 through wireless transmission methods such as USB data cable or Bluetooth. The mobile terminal 30 is provided with a boot module 31 and a control unit 32. The boot module 31 starts running after the mobile terminal 30 is powered on. , And guide the operation of the control unit 32. In addition, the mobile terminal 30 is provided with a central processing unit, a storage device, etc., and the mobile terminal 30 is provided with a network card, which can perform wireless communication with the cloud server 40 through a wireless network.
[0028] Before the user performs a flashing operation on the mobile terminal 30, the mobile terminal 30 and the computer 40 need to be connected, that is, the mobile terminal 30 and the computer 40 can communicate. Such as image 3 As shown, when the computer 40 performs a flashing operation on the mobile terminal 30, it first reads a specific storage area in the storage device of the mobile terminal 30, that is, executes step S1, and then determines whether the mobile terminal 30 is the first flashing based on the read information, that is, Step S2 is executed. If it is determined that it is the first flashing, then step S3 is executed. The first flashing protection module 41 encrypts the physical network card address of the mobile terminal 30 and the serial number data of the storage device, and stores them in a specific storage area of ​​the storage device of the mobile terminal 30 .
[0029] Therefore, in step S1, the computer 40 judges whether the mobile terminal 30 is the first flashing machine, as long as it detects whether the encrypted physical network card address and the serial number data of the storage device are stored in the specific storage area.
[0030] After step S3 is executed, the computer 40 performs a system refresh operation on the mobile terminal 30, that is, step S5 is executed to complete the work of refreshing.
[0031] If the computer 40 determines that the mobile terminal 30 is not flashing for the first time, that is, the mobile terminal 30 is flashing again, at this time, the flashing protection unit 42 executes step S4 to combine the data stored in the specific storage area of ​​the mobile terminal 30 with the hardware information of the mobile terminal 30 For comparison, it is determined whether the physical network card address of the mobile terminal 30 is the same as the physical network card address stored in the specific storage area of ​​the mobile terminal 30, and whether the storage device serial number data of the mobile terminal 30 is the same as the stored data, if any If it is not the same, it means that the hardware device of the mobile terminal 30 has been modified and the flashing operation is not performed. Only if it is determined that the hardware device data of the mobile terminal 30 is the same as the stored data, that is, it is determined that the hardware device of the mobile terminal 30 has not been illegally modified, step S5 can be executed to refresh the system.
[0032] Of course, in order to protect the mobile terminal 30 well, the modification authority of the hardware data of the mobile terminal 30 can be set. For example, the data in the specific storage area cannot be read and written by the user of the mobile terminal 30, and only users logged in the cloud server 20 can read, write, access and modify the data in the specific storage area of ​​the mobile terminal 30 through the remote control unit 22. In this way, it can be ensured that only the real user of the mobile terminal 30 can modify the hardware device data of the mobile terminal 30, and prevent the mobile terminal 30 from being maliciously flashed and user data loss.
[0033] The storage unit 21 of the cloud server 20 stores the user's personal data, and the remote control unit 22 is provided with a user information module 23, which stores user information such as the user name and password for the user to log in to the cloud server 20, and also stores a number of mobile terminals The hardware information of 30 includes the physical network card address of the mobile terminal 30 and the serial number data of the storage device, and each user information is associated with the hardware information of the mobile terminal 30 of the user. In this way, after the user logs in to the cloud server 20, he can browse the hardware information of his multiple mobile terminals 30, and he can also modify the hardware information.
[0034] Therefore, the user can log in to the remote control unit 22 and input information such as the user name before flashing the machine. During the first flashing, the mobile terminal 30 uploads its hardware information to the remote control unit 22, including data including the mobile terminal's physical network card address and storage device serial number. The remote control unit 22 associates and stores these hardware information and user information.
[0035] The remote control unit 22 is also provided with a forced data clearing module 24, a GPS data forced transmission module 25, and an alarm forced working module 26. These modules work according to the instructions issued by the user after the remote user logs in to the remote control unit 22, and the above When the module is working, it sends a forced data clearing instruction, a GPS data forced transmission instruction, and an alarm forced working instruction to the mobile terminal 30 respectively. After the mobile terminal 30 is lost, the user can log in to the cloud server 20, and the remote control unit 22 sends the above instructions to the lost mobile terminal 30 to clear the data in the mobile terminal 30 in time to ensure that the data is not leaked, and can be timely The location of the mobile terminal 30 is found.
[0036] See Figure 4 After the mobile terminal 30 is powered on, it first runs the boot module, that is, executes step S11, and then performs hardware verification, that is, executes step S12. If the hardware verification is successful, then executes step S13, otherwise the operation ends.
[0037] In step S13, the guidance module 31 of the mobile terminal 30 determines whether it has received a forced data clearing instruction from the remote control unit 22. The forced data clearing instruction includes a forced clearing instruction for all data and a forced clearing instruction for user data. The forced clearing instruction for all data is required The mobile terminal 30 forcibly clears all data, including system data and user data. The user data forced clearing instruction only needs to clear the user data without processing the system data.
[0038] After the mobile terminal 30 receives the command of forcibly clearing all data, it executes step S14 to forcefully clear all the data, and exits the system after clearing. If the mobile terminal 30 does not receive all the data forcibly clearing instructions, step S14 is executed to run the control system 32, and the guidance module 31 transmits the received instructions to the control system 32, that is, step S15 is executed.
[0039] Then, the control system 32 determines whether a user data forced clearing instruction is received, that is, step S16 is executed. If a user data forced clearing instruction is received, step S17 is executed to force the user data stored in the mobile terminal 30 to be cleared. If the user data forced clearing instruction is not received, step S18 is executed to further determine whether a GPS data forced transmission instruction is received. If the instruction is received, step S19 is executed to run the GPS program in the background to obtain GPS data of the mobile terminal 30 and Upload to the cloud server 20. In this way, the cloud server 20 can determine the location of the mobile terminal 30 according to the received GPS data.
[0040] If the control unit 32 determines that the GPS data forced transmission instruction is not received, it executes step S20 to determine whether an alarm forced operation instruction is received, and if the instruction is received, executes step S21 to force the alarm operation of the mobile terminal 30 to operate. A sound is emitted on the mobile terminal 30 to facilitate the search of the mobile terminal 30.
[0041] Finally, if the control unit 32 judges that it has not received the above-mentioned instruction, it executes step S22 and runs normally, and when it is judged that the system exits the operation, that is, it executes step S23 and the judgment is yes, then ends the operation.
[0042] In order to ensure that the mobile terminal 30 can complete the information sent to the cloud server 20 in real time, it can be set that when the control unit 32 does not shake hands with the cloud server 20, the mobile terminal 30 will pop up a prompt window every specific time. In addition, the control unit 32 provides a back door that communicates with the remote control unit 22 to receive information sent by the remote control unit 22 in the background.
[0043] It can be seen that the remote control system can protect the data of the mobile terminal through the flashing protection unit and the remote control unit running on the cloud server, and can forcibly clear the data of the mobile terminal, avoid the leakage of personal data of the mobile terminal, and reduce the cost. Users cause trouble. In addition, it is convenient to locate the mobile terminal by forcing the mobile terminal to upload GPS data, and by forcing the alarm to work, it is convenient for the user to find the lost mobile terminal, which brings convenience to the user.
[0044] Of course, the above-mentioned embodiments are only preferred implementations of the present invention. In actual application, there can be more changes. For example, it can be set to require the user to log in to the cloud server and send permission information to the mobile terminal when re-wiping the phone; or, The hardware information of the mobile terminal is only stored in the remote control unit, not in the mobile terminal. Such a change can also achieve the purpose of the present invention.
[0045] Finally, it needs to be emphasized that the present invention is not limited to the above-mentioned embodiments. For example, changes in the type of mobile terminal, changes in hardware device information, including changes in quantity types, etc., should also be included in the protection scope of the claims of the present invention.

PUM

no PUM

Description & Claims & Application Information

We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.

Similar technology patents

Crossing passing state prompt method and system

InactiveCN110415541AImprove road traffic efficiencyprotection security
Owner:CHONGQING CHANGAN AUTOMOBILE CO LTD

Screen lock based data protection method and device

ActiveCN104182667Aprevent crackingprotection security
Owner:GUANGDONG OPPO MOBILE TELECOMM CORP LTD

Stainless steel anti-collision structure of automobile

Owner:CHANGZHOU COLLEGE OF INFORMATION TECH

Classification and recommendation of technical efficacy words

  • protection security

Shell adding and removing method for Android platform application program protection

InactiveCN103530535Aprotect confidentialityprotection security
Owner:JIANGSU PAYEGIS INFORMATION SECURITY TECH CO LTD

Blockchain data protection method, device, system and computer readable storage medium

PendingCN109690551Aprotection securityRich types of computing operations
Owner:BCM SOCIAL CORP +1

Industrial access control method and device

InactiveCN102377740AReduce the risk of attackprotection security
Owner:SIEMENS AG

Method and device for implementing graded display of privacy information

ActiveCN101917513Aprotection securityInformation management optimization
Owner:ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products