Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair
Embodiment in bright, every other implementation obtained by those of ordinary skill in the art without making creative efforts
Example, shall fall within the protection scope of the present invention.
It is the flow chart for the anti-lost processing method of mobile terminal that one embodiment of the invention provides referring to Fig. 1, Fig. 1.Institute
It states method and is applied to mobile terminal, TrustZone control system is installed in the mobile terminal, as shown in Figure 1, the method
The following steps are included:
Step 101 is logged in the network server using the account registered on network server, and taken with the network
Business device establishes connection.
With the development of science and technology mobile terminal has gradually come into people's lives, at indispensable in people's life
Few article, and the dependence with people to mobile terminal, more and more people by respective data, deposit by privacy information
It is stored in mobile terminal, once many inconvenience can be brought it follows that mobile terminal is lost, and more difficult gives for change.
Therefore, in order to more easily give mobile terminal for change, in this step, user is mobile after obtaining mobile terminal
Terminal can open retrieval function under the operation of user, to facilitate user to give for change when there is mobile terminal loss,
In general, after mobile terminal networking, mobile terminal can under the operation of user on network server register account number, with moving back
The account that registration can be used in dynamic terminal logs in the network server, and the network server establishes connection, to open
Dynamic mobile terminal gives mode for change.
Wherein, register account number can be user and log in the network server using mobile terminal and registers, can also be with
It is that user logs in the network server using other ten times and registers, does not do any restriction.
Wherein, the account of registration can refer to account associated with the characteristic information of mobile terminal, such as the account registered
Number can be associated with the mobile equipment identity code of mobile terminal, that is, the IMEI code of mobile terminal is associated.
Step 102 is switched to safe mode using the TrustZone control system.
In the step, when the mobile terminal logs in the network server using the account of registration, with network clothes
Business device is established after connection, and the mobile terminal can use the TrustZone control system of installation, and the mobile terminal is cut
Change to safe mode.
Be switched to safe mode, can to avoid mobile terminal during carrying out data processing by extraneous interference,
For example virus invades and harasses mobile terminal or third party software steals the malice of data in mobile terminal.
Step 103, under the safe mode, by the secure information storage of the mobile terminal into RPMB subregion,
In, the security information includes the account, the IMEI code and emergency contact of the mobile terminal comprising login name and password
People's information.
In the step, after the mobile terminal is switched to safe mode, the mobile terminal can be in the safety
Security information under mode, by the secure information storage of the mobile terminal into RPMB subregion, as backup.
Wherein, the security information includes the account, the IMEI code of the mobile terminal comprising login name and password
And emergency contact information.
Wherein, RPMB subregion can refer to a disk partition on the move, i.e. one of storage device in mobile terminal
A subregion refers in particular to winding protection subregion, and such subregion can be user can make when needing to store significant data
Subregion, and use authorization encryption mechanism protect data subregion, that is to say, that even if mobile terminal cleared data,
System is formatted or resets, the data in RPMB subregion will not be removed, and only know the Crypted password of RPMB subregion
People, by RPMB subregion decryption after, the data in RPMB subregion could be rewritten.
If step 104, the data of the mobile terminal are removed, be formatted or system is reset, extract described in
The security information in RPMB subregion.
In general, present mobile terminal is provided with cryptoguard, such as finger-print cipher or numerical ciphers, need to light
Mobile terminal carry out using use need to input correct password, but when mobile terminal is lost, due to picking up
To or steal the people of mobile terminal and do not know password, can not normal use mobile terminal, it is possible that needing mobile terminal
In data dump could be used from new.
Therefore, in this step, if mobile terminal is lost, if mobile terminal is in detecting mobile terminal
Data are removed, and perhaps mobile terminal is formatted or mobile terminal is by refitting system, then mobile terminal can be
After starting, extracts the security information in the RPMB subregion and carry out using and avoiding the machine as complete blank.
Step 105 using the security information and the network server establishes connection under connected state again.
In the step, the mobile terminal is after extracting the security information in the RPMB subregion, the movement
Terminal can establish connection in the state of networking, and using the security information and the network server herein.
Wherein, connection is established again, be can be mobile terminal and is used the account automated log in the security information
The network server.
In this way, mobile terminal is being lost immediately, and data are removed, are formatted or reset system by brush machine
Afterwards, the security information still can be used in mobile terminal and the network server establishes connection again, makes to lose mobile whole
The user at end can be associated with by the network server with mobile terminal foundation, find mobile terminal to facilitate.
In the embodiment of the present invention, above-mentioned mobile terminal any can be equipped with the mobile terminal of TrustZone control system,
Such as: mobile phone, tablet computer (Tablet Personal Computer), laptop computer (Laptop Computer), individual
Digital assistants (personal digital assistant, abbreviation PDA), mobile Internet access device (Mobile Internet
Device, MID) or wearable device (Wearable Device) etc..
Mobile terminal provided in an embodiment of the present invention anti-lost processing method is equipped in the mobile terminal
TrustZone control system logs in the network server using the account registered on network server, and with the network
Server establishes connection;Safe mode is switched to using the TrustZone control system;Under the safe mode, by institute
The secure information storage of mobile terminal is stated into RPMB subregion, wherein the security information includes comprising login name and password
The account, the IMEI code of the mobile terminal and emergency contact information;If the data of the mobile terminal are removed, by lattice
Formula or system are reset, then extract the security information in the RPMB subregion;The peace is used under connected state
Full information and the network server establish connection again.In this way, even if mobile terminal lose after by the clearing data of malice, lattice
Formula or refitting system, mobile terminal still can when operation security information from RPMB multi-subarea extracting to storage,
Protection system is established using security information and connect with network server, give the mobile terminal of loss for change convenient for user.
Referring to fig. 2, Fig. 2 be another embodiment of the present invention provides the anti-lost processing method of mobile terminal flow chart,
As shown in Figure 2, comprising the following steps:
Step 201 is logged in the network server using the account registered on network server, and taken with the network
Business device establishes connection.
Step 202 is switched to safe mode using the TrustZone control system.
Step 203, under the safe mode, by the secure information storage of the mobile terminal into RPMB subregion,
In, the security information includes the account, the IMEI code and emergency contact of the mobile terminal comprising login name and password
People's information.
If step 204, the data of the mobile terminal are removed, be formatted or system is reset, extract described in
The security information in RPMB subregion.
Step 205 using the security information and the network server establishes connection under connected state again.
Wherein, the step 101 in step 201, step 202, step 203, step 204 and step 205 and above-described embodiment,
Step 102, step 103, step 104 and step 105 are identical, and this will not be repeated here.
Step 206 receives the control command that the network server is sent.
If the mobile terminal is lost, user can be the network server of the mobile terminal connection
On indicated, mobile terminal described in remarks is lost, and then terminal altogether is searched by the network server, because
This, in this step, since the mobile terminal has used the security information to take in the state of networking with the network
Business device establishes connection again, so the mobile terminal can receive the control life sent from the network server
It enables.
Wherein, it controls order and can be and lose the user of the mobile terminal by the network server to the shifting
What dynamic terminal was sent, for controlling the control command that the mobile terminal is given for change.
Step 207 is based on the control command, and geographical location information locating for the mobile terminal is sent to the net
Network server.
In the step, the mobile terminal is after receiving the control command that the network server is sent, the movement
Mobile terminal geographical location information locating at present can be sent to the network and taken by terminal according to the control command
Business device, so that user looks for the mobile terminal.
Wherein, the control command, except including controlling the mobile terminal for the real-time geographical locations of the mobile terminal
Information is sent to the instruction of the network server, can also be pre-set by user including controlling the mobile terminal
Privacy information maintains secrecy, the instruction that the users such as instruction that can not be shown control the mobile terminal, herein not one by one
It enumerates.
Optionally, after step 206, which comprises
Based on the control command, the telephone number of current SIM card in the mobile terminal is sent to contact number,
In, the contact number is stored in the emergency contact information.
In the step, the mobile terminal is after receiving the control command that the network server is sent, the movement
The telephone number for the SIM card being newly inserted into the mobile terminal can be sent to preset by terminal according to the control command
Contact number, so that the information of the people of mobile terminal is picked up or stolen to the user query of lost mobile terminal.
Wherein, the contact number is stored in the emergency contact information.
Optionally, after step 207, which comprises
Receive the information for the search equipment that the network server is sent;It is and described based on the information of described search equipment
Search for equipment connection;The prompt information of the mobile terminal real time position is sent to described search equipment.
In the step, connection is established again in the mobile terminal and the network server, and to the network service
After device sends geographical location information, in order to find the mobile terminal, the network server can be to the movement
Terminal sends one and is used to find the mobile terminal, and the information for the search equipment that can be matched with the mobile terminal,
After the mobile terminal receives the information of described search equipment, using the information of described search equipment, set with described search
Standby to establish connection, then the mobile terminal is after the connection of described search equipment, can send and mention to described search equipment
Show information, so that user looks for the mobile terminal.
Wherein, the prompt information can be the letter for the real time position variation that mobile terminal is sent to described search equipment
Breath is also possible to the prompt information such as distance between the two.
Optionally, after the step of sending the prompt information of the mobile terminal real time position to described search equipment,
The described method includes:
Detect the distance between the mobile terminal and described search equipment;If the mobile terminal and described search equipment
The distance between be less than preset threshold, sound an alarm.
In the step, when establishing connection between the mobile terminal and described search equipment, and it is big to described search equipment
After Song's prompt information, the mobile terminal can with the distance between mobile terminal described in real-time detection and described search equipment,
If the mobile terminal and described search equipment are close, and your distance of the two bracket be less than preset threshold when, institute
Stating mobile terminal can sound an alarm, to warn close described search equipment, to find the mobile terminal.
Wherein, the alarm can be mobile terminal and directly issue the indicative movements such as the sound of warning, is also possible to
Mobile terminal sends special prompt to described search equipment, and to inform described search equipment, mobile terminal is nearby.
Mobile terminal provided in an embodiment of the present invention anti-lost processing method is equipped in the mobile terminal
TrustZone control system logs in the network server using the account registered on network server, and with the network
Server establishes connection;Safe mode is switched to using the TrustZone control system;Under the safe mode, by institute
The secure information storage of mobile terminal is stated into RPMB subregion, wherein the security information includes comprising login name and password
The account, the IMEI code of the mobile terminal and emergency contact information;If the data of the mobile terminal are removed, by lattice
Formula or system are reset, then extract the security information in the RPMB subregion;The peace is used under connected state
Full information and the network server establish connection again;Receive the control command that the network server is sent;Based on described
Geographical location information locating for the mobile terminal is sent to the network server by control command.In this way, even if mobile whole
End by malice clears data, formats or reset system after losing, mobile terminal still can when running from
RPMB multi-subarea extracting is to the security information stored, to establish protection system using security information and be connect with network server,
And the position of mobile terminal is sent to network server to inform user, gives the mobile terminal of loss for change convenient for user.
It is one of the structure chart of mobile terminal that one embodiment of the invention provides referring to Fig. 3 to Fig. 6, Fig. 3, Fig. 4 is this hair
Two, Fig. 5 of the structure chart for the mobile terminal that a bright embodiment provides is the structure for the mobile terminal that one embodiment of the invention provides
Three, Fig. 6 of figure is the four of the structure chart for the mobile terminal that one embodiment of the invention provides.It is equipped in the mobile terminal
TrustZone control system, as shown in Figures 3 to 6, mobile terminal 300 includes:
Log-in module 310, for logging in the network server using the account registered on network server, and with institute
It states network server and establishes connection.
Switching module 320, for being switched to safe mode using the TrustZone control system.
Memory module 330, under the safe mode, the secure information storage of the mobile terminal to RPMB to be divided
Qu Zhong, wherein the security information includes the account comprising login name and password, the IMEI code of the mobile terminal and tight
Anxious contact information.
Extraction module 340, if the data for the mobile terminal are removed, are formatted or system is reset,
Extract the security information in the RPMB subregion.
First link block 350, for using the security information and the network server again under connected state
Establish connection.
Optionally, the mobile terminal 300 includes:
First receiving module 360, the control command sent for receiving the network server.
First sending module 370, for being based on the control command, by geographical location information locating for the mobile terminal
It is sent to the network server.
Further, the mobile terminal 300 includes:
Second sending module 380, for sending the phone number of current SIM card in the mobile terminal to contact number
Code, wherein the contact number is stored in the emergency contact information.
Optionally, the mobile terminal 300 includes:
Second receiving module 301, for receiving the information for the search equipment that the network server is sent.
Second link block 302 is connect for the information based on described search equipment with described search equipment.
Third sending module 303, for sending the prompt information of the mobile terminal real time position to described search equipment.
Optionally, the mobile terminal 300 includes:
Detection module 304, for detecting the distance between the mobile terminal and described search equipment;
Alarm modules 305, if being less than preset threshold, hair for the distance between the mobile terminal and described search equipment
Alarm out.
Mobile terminal 300 can be realized each process that mobile terminal is realized in the embodiment of the method for Fig. 1 to Fig. 2, to keep away
Exempt to repeat, which is not described herein again.
Mobile terminal provided in an embodiment of the present invention is equipped with TrustZone control system in the mobile terminal, utilizes
The account registered on network server logs in the network server, and establishes connection with the network server;Using institute
It states TrustZone control system and is switched to safe mode;Under the safe mode, the security information of the mobile terminal is deposited
It stores up in RPMB subregion, wherein the security information includes the account, the mobile terminal comprising login name and password
IMEI code and emergency contact information;If the data of the mobile terminal are removed, be formatted or system is reset, mention
Take the security information in the RPMB subregion;Under connected state again using the security information and the network server
It is secondary to establish connection.In this way, movement is eventually even if clearing data, formatting or resetting system by malice after mobile terminal loss
End still can when operation security information from RPMB multi-subarea extracting to storage, to establish protection body using security information
It is and is connect with network server, gives the mobile terminal of loss for change convenient for user.
It is the structure chart for the mobile terminal that real another embodiment of the invention provides referring to Fig. 7, Fig. 7, as shown in fig. 7, mobile
Terminal 700 includes: at least one processor 701, memory 702, at least one network interface 704 and user interface 703.It is mobile
Various components in terminal 700 are coupled by bus system 705.It is understood that bus system 705 is for realizing these groups
Connection communication between part.Bus system 705 further includes power bus, control bus and state in addition to including data/address bus
Signal bus.But for the sake of clear explanation, various buses are all designated as bus system 705 in Fig. 7.
Wherein, user interface 703 may include display, keyboard or pointing device (for example, mouse, trace ball
(trackball), touch-sensitive plate or touch screen etc..
It is appreciated that the memory 702 in the embodiment of the present invention can be volatile memory or nonvolatile memory,
It or may include both volatile and non-volatile memories.Wherein, nonvolatile memory can be read-only memory (Read-
Only Memory, ROM), programmable read only memory (Programmable ROM, PROM), the read-only storage of erasable programmable
Device (Erasable PROM, EPROM), electrically erasable programmable read-only memory (Electrically EPROM, EEPROM) or
Flash memory.Volatile memory can be random access memory (Random Access Memory, RAM), be used as external high
Speed caching.By exemplary but be not restricted explanation, the RAM of many forms is available, such as static random access memory
(Static RAM, SRAM), dynamic random access memory (Dynamic RAM, DRAM), Synchronous Dynamic Random Access Memory
(Synchronous DRAM, SDRAM), double data speed synchronous dynamic RAM (Double Data Rate
SDRAM, DDRSDRAM), enhanced Synchronous Dynamic Random Access Memory (Enhanced SDRAM, ESDRAM), synchronized links
Dynamic random access memory (Synchlink DRAM, SLDRAM) and direct rambus random access memory (Direct
Rambus RAM, DRRAM).The memory 702 of system and method described herein is intended to include but is not limited to these and arbitrarily its
It is suitble to the memory of type.
In some embodiments, memory 702 stores following element, executable modules or data structures, or
Their subset of person or their superset: operating system 7021 and application program 7022.
Wherein, operating system 7021 include various system programs, such as ccf layer, core library layer, driving layer etc., are used for
Realize various basic businesses and the hardware based task of processing.Application program 7022 includes various application programs, such as media
Player (Media Player), browser (Browser) etc., for realizing various applied business.Realize the embodiment of the present invention
The program of method may be embodied in application program 7022.
In embodiments of the present invention, by the program or instruction of calling memory 702 to store, specifically, can be application
The program or instruction stored in program 7022, processor 701 are used for:
The network server is logged in using the account registered on network server, and is established with the network server
Connection;Safe mode is switched to using the TrustZone control system;Under the safe mode, by the mobile terminal
700 secure information storage is into RPMB subregion, wherein the security information includes the account comprising login name and password
Number, the IMEI code of the mobile terminal 700 and emergency contact information;If the data of the mobile terminal 700 are removed, by lattice
Formula is reset, then extracts the security information in the RPMB subregion;The safety letter is used under connected state
Breath establishes connection with the network server again.
The method that the embodiments of the present invention disclose can be applied in processor 701, or be realized by processor 701.
Processor 701 may be a kind of IC chip, the processing capacity with signal.During realization, the above method it is each
Step can be completed by the integrated logic circuit of the hardware in processor 701 or the instruction of software form.Above-mentioned processing
Device 701 can be general processor, digital signal processor (Digital Signal Processor, DSP), dedicated integrated electricity
Road (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field
Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic,
Discrete hardware components.It may be implemented or execute disclosed each method, step and the logic diagram in the embodiment of the present invention.It is general
Processor can be microprocessor or the processor is also possible to any conventional processor etc..In conjunction with institute of the embodiment of the present invention
The step of disclosed method, can be embodied directly in hardware decoding processor and execute completion, or with the hardware in decoding processor
And software module combination executes completion.Software module can be located at random access memory, and flash memory, read-only memory may be programmed read-only
In the storage medium of this fields such as memory or electrically erasable programmable memory, register maturation.The storage medium is located at
The step of memory 702, processor 701 reads the information in memory 702, completes the above method in conjunction with its hardware.
It is understood that embodiments described herein can with hardware, software, firmware, middleware, microcode or its
Combination is to realize.For hardware realization, processing unit be may be implemented in one or more specific integrated circuit (Application
Specific Integrated Circuits, ASIC), digital signal processor (Digital Signal Processing,
DSP), digital signal processing appts (DSP Device, DSPD), programmable logic device (Programmable Logic
Device, PLD), field programmable gate array (Field-Programmable Gate Array, FPGA), general processor,
In controller, microcontroller, microprocessor, other electronic units for executing herein described function or combinations thereof.
For software implementations, it can be realized herein by executing the module (such as process, function etc.) of function described herein
The technology.Software code is storable in memory and is executed by processor.Memory can in the processor or
It is realized outside processor.
Optionally, processor 701 is also used to:
Receive the control command that the network server is sent;Based on the control command, by 700 institute of mobile terminal
The geographical location information at place is sent to the network server.
Optionally, processor 701 is also used to:
Based on the control command, the phone number of current SIM card in the mobile terminal 700 is sent to contact number
Code, wherein the contact number is stored in the emergency contact information.
Optionally, processor 701 is also used to:
Receive the information for the search equipment that the network server is sent;It is and described based on the information of described search equipment
Search for equipment connection;The prompt information of 700 real time position of mobile terminal is sent to described search equipment.
Optionally, processor 701 is also used to:
Detect the distance between the mobile terminal 700 and described search equipment;If the mobile terminal 700 is searched with described
The distance between rope equipment is less than preset threshold, sounds an alarm.
Mobile terminal 700 can be realized each process that mobile terminal is realized in previous embodiment, to avoid repeating, here
It repeats no more.
Mobile terminal provided in an embodiment of the present invention is equipped with TrustZone control system in the mobile terminal, utilizes
The account registered on network server logs in the network server, and establishes connection with the network server;Using institute
It states TrustZone control system and is switched to safe mode;Under the safe mode, the security information of the mobile terminal is deposited
It stores up in RPMB subregion, wherein the security information includes the account, the mobile terminal comprising login name and password
IMEI code and emergency contact information;If the data of the mobile terminal are removed, be formatted or system is reset, mention
Take the security information in the RPMB subregion;Under connected state again using the security information and the network server
It is secondary to establish connection.In this way, movement is eventually even if clearing data, formatting or resetting system by malice after mobile terminal loss
End still can when operation security information from RPMB multi-subarea extracting to storage, to establish protection body using security information
It is and is connect with network server, gives the mobile terminal of loss for change convenient for user.
5th embodiment
Referring to Fig. 8, Fig. 8 is the structure chart for the mobile terminal that further embodiment of this invention provides, as shown in figure 8, mobile
Terminal 800 include radio frequency (Radio Frequency, RF) circuit 810, memory 820, input unit 830, display unit 840,
Processor 850, voicefrequency circuit 860, communication module 870 and power supply 880.
Wherein, input unit 830 can be used for receiving the number or character information of user's input, and generation and mobile terminal
The related signal input of 800 user setting and function control.Specifically, in the embodiment of the present invention, which can
To include touch panel 831.Touch panel 831, also referred to as touch screen collect the touch operation of user on it or nearby
(for example user uses the operations of any suitable object or attachment on touch panel 831 such as finger, stylus), and according to preparatory
The corresponding connection mobile terminal of formula driving of setting.Optionally, touch panel 831 may include touch detection mobile terminal and touching
Touch two parts of controller.Wherein, the touch orientation of touch detection mobile terminal detection user, and detect touch operation bring
Signal transmits a signal to touch controller;Touch controller receives touch information from touch detection mobile terminal, and by it
It is converted into contact coordinate, then gives the processor 850, and order that processor 850 is sent can be received and executed.In addition,
Touch panel 831 can be realized using multiple types such as resistance-type, condenser type, infrared ray and surface acoustic waves.In addition to touch surface
Plate 831, input unit 830 can also include other input equipments 832, other input equipments 832 can include but is not limited to object
Manage one of keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse, operating stick etc. or more
Kind.
Wherein, display unit 840 can be used for showing information input by user or be supplied to the information and movement of user
The various menu interfaces of terminal 800.Display unit 840 may include display panel 841, optionally, can use LCD or organic hair
The forms such as optical diode (Organic Light-Emitting Diode, OLED) configure display panel 841.
It should be noted that touch panel 831 can cover display panel 841, touch display screen is formed, when the touch display screen is examined
After measuring touch operation on it or nearby, processor 850 is sent to determine the type of touch event, is followed by subsequent processing device
850 provide corresponding visual output according to the type of touch event in touch display screen.
Touch display screen includes Application Program Interface viewing area and common control viewing area.The Application Program Interface viewing area
And arrangement mode of the common control viewing area does not limit, can be arranged above and below, left-right situs etc. can distinguish two it is aobvious
Show the arrangement mode in area.The Application Program Interface viewing area is displayed for the interface of application program.Each interface can be with
The interface elements such as the icon comprising at least one application program and/or widget desktop control.The Application Program Interface viewing area
Or the empty interface not comprising any content.This commonly uses control viewing area for showing the higher control of utilization rate, for example,
Application icons such as button, interface number, scroll bar, phone directory icon etc. are set.The touch screen of the embodiment of the present invention is soft
Property screen, organic transparent conductive film of carbon nanotube is posted in two faces of flexible screen.
Wherein processor 850 is the control centre of mobile terminal 800, utilizes various interfaces and connection whole mobile phone
Various pieces, by running or executing the software program and/or module that are stored in first memory 821, and calling storage
Data in second memory 822 execute the various functions and processing data of mobile terminal 800, thus to mobile terminal 800
Carry out integral monitoring.Optionally, processor 850 may include one or more processing units.
In embodiments of the present invention, by call store the first memory 821 in software program and/or module and/
Or the data in the second memory 822, processor 850 are used for:
The network server is logged in using the account registered on network server, and is established with the network server
Connection;Safe mode is switched to using the TrustZone control system;Under the safe mode, by the mobile terminal
800 secure information storage is into RPMB subregion, wherein the security information includes the account comprising login name and password
Number, the IMEI code of the mobile terminal 800 and emergency contact information;If the data of the mobile terminal 800 are removed, by lattice
Formula or system are reset, then extract the security information in the RPMB subregion;The peace is used under connected state
Full information and the network server establish connection again.
Optionally, processor 850 is also used to:
Receive the control command that the network server is sent;Based on the control command, by 800 institute of mobile terminal
The geographical location information at place is sent to the network server.
Optionally, processor 850 is also used to:
Based on the control command, the phone number of current SIM card in the mobile terminal 800 is sent to contact number
Code, wherein the contact number is stored in the emergency contact information.
Optionally, processor 850 is also used to:
Receive the information for the search equipment that the network server is sent;It is and described based on the information of described search equipment
Search for equipment connection;The prompt information of 800 real time position of mobile terminal is sent to described search equipment.
Optionally, processor 850 is also used to:
Detect the distance between the mobile terminal 800 and described search equipment;If the mobile terminal 800 is searched with described
The distance between rope equipment is less than preset threshold, sounds an alarm.
Mobile terminal 800 can be realized each process that mobile terminal is realized in previous embodiment, to avoid repeating, here
It repeats no more.
Mobile terminal provided in an embodiment of the present invention is equipped with TrustZone control system in the mobile terminal, utilizes
The account registered on network server logs in the network server, and establishes connection with the network server;Using institute
It states TrustZone control system and is switched to safe mode;Under the safe mode, the security information of the mobile terminal is deposited
It stores up in RPMB subregion, wherein the security information includes the account, the mobile terminal comprising login name and password
IMEI code and emergency contact information;If the data of the mobile terminal are removed, be formatted or system is reset, mention
Take the security information in the RPMB subregion;Under connected state again using the security information and the network server
It is secondary to establish connection.In this way, movement is eventually even if clearing data, formatting or resetting system by malice after mobile terminal loss
End still can when operation security information from RPMB multi-subarea extracting to storage, to establish protection body using security information
It is and is connect with network server, gives the mobile terminal of loss for change convenient for user.
Those of ordinary skill in the art may be aware that list described in conjunction with the examples disclosed in the embodiments of the present disclosure
Member and algorithm steps can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually
It is implemented in hardware or software, the specific application and design constraint depending on technical solution.Professional technician
Each specific application can be used different methods to achieve the described function, but this realization is it is not considered that exceed
The scope of the present invention.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description,
The specific work process of device and unit, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In embodiment provided herein, it should be understood that disclosed device and method can pass through others
Mode is realized.For example, the apparatus embodiments described above are merely exemplary, for example, the division of the unit, only
A kind of logical function partition, there may be another division manner in actual implementation, for example, multiple units or components can combine or
Person is desirably integrated into another system, or some features can be ignored or not executed.Another point, shown or discussed is mutual
Between coupling, direct-coupling or communication connection can be through some interfaces, the INDIRECT COUPLING or communication link of device or unit
It connects, can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit
The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple
In network unit.Some or all of unit therein can be selected to realize the embodiment of the present invention according to the actual needs
Purpose.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit
It is that each unit physically exists alone, can also be integrated in one unit with two or more units.
It, can be with if the function is realized in the form of SFU software functional unit and when sold or used as an independent product
It is stored in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially in other words
The part of the part that contributes to existing technology or the technical solution can be embodied in the form of software products, the meter
Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be a
People's computer, server or network equipment etc.) it performs all or part of the steps of the method described in the various embodiments of the present invention.
And storage medium above-mentioned includes: that USB flash disk, mobile hard disk, ROM, RAM, magnetic or disk etc. are various can store program code
Medium.
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, any
Those familiar with the art in the technical scope disclosed by the present invention, can easily think of the change or the replacement, and should all contain
Lid is within protection scope of the present invention.Therefore, protection scope of the present invention should be subject to the protection scope in claims.