CN109190422A - Terminal anti-theft method, terminal and the device with store function - Google Patents

Terminal anti-theft method, terminal and the device with store function Download PDF

Info

Publication number
CN109190422A
CN109190422A CN201810998251.1A CN201810998251A CN109190422A CN 109190422 A CN109190422 A CN 109190422A CN 201810998251 A CN201810998251 A CN 201810998251A CN 109190422 A CN109190422 A CN 109190422A
Authority
CN
China
Prior art keywords
terminal
traffic path
predetermined traffic
user
current position
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201810998251.1A
Other languages
Chinese (zh)
Inventor
方晓伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qiku Internet Technology Shenzhen Co Ltd
Original Assignee
Qiku Internet Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qiku Internet Technology Shenzhen Co Ltd filed Critical Qiku Internet Technology Shenzhen Co Ltd
Priority to CN201810998251.1A priority Critical patent/CN109190422A/en
Publication of CN109190422A publication Critical patent/CN109190422A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/88Detecting or preventing theft or loss
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/448Execution paradigms, e.g. implementations of programming paradigms
    • G06F9/4482Procedural
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/10Terrestrial scenes

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Computer Security & Cryptography (AREA)
  • Alarm Systems (AREA)
  • Burglar Alarm Systems (AREA)

Abstract

This application discloses a kind of terminal anti-theft method, terminal and with the device of store function, wherein terminal anti-theft method includes: to monitor the current position of first terminal;If first terminal deviates predetermined traffic path in current time, its current position, then issue prompt information, to prompt first terminal to be currently likely to be at stolen status, predetermined traffic path includes the corresponding relationship between period and section, by above-mentioned terminal anti-theft method, the case where terminal is stolen can be reduced.

Description

Terminal anti-theft method, terminal and the device with store function
Technical field
This application involves field of terminal technology, more particularly to a kind of terminal anti-theft method, terminal and have store function Device.
Background technique
With the continuous development of electronic technology, the terminals such as mobile phone, palm PC have become in people's daily life the most Common means of communication.Perfect with technology simultaneously, the performance of terminal is become better and better, volume is smaller and smaller, and then terminal Price is also continuously improved.When user goes out, terminal be typically placed at packet in, the medium fixed position of pocket, due to terminal Placement location is more casual so that criminal be easy steal successfully, especially flow of the people it is bigger, than more crowded public transport In the vehicles such as vehicle, train or similar applications, the case for stealing terminal is more common.
Usually after terminal is stolen, some criminals can using the progress fraud of the information in terminal, such as using Contact information in stolen terminal carries out threatening and extorts, sells the information in stolen terminal, criminal also It is paid using the payment software in terminal, arbitrarily spends the money of terminal user, not only brought more to terminal user in this way Economic loss, can also generate a panic, disturb public order to society, therefore, how effectively reduce the case where terminal is stolen It is a problem of current terminal manufacturer urgent need to resolve.And in the prior art, user will not generally send out when terminal is stolen Feel, and after user realizes, have been subjected to the best period for giving terminal for change.
Summary of the invention
How the main technical problems to be solved of the application reduce the case where terminal is stolen.
In order to solve the above technical problems, the technical solution that the application uses is: providing a kind of terminal anti-theft method, wrap It includes:
Monitor the current position of first terminal;
If the first terminal deviates predetermined traffic path in current time, its current position, prompt information is issued, To prompt the first terminal to be currently likely to be at stolen status, the predetermined traffic path includes between period and section Corresponding relationship.
Wherein, the method also includes:
Obtain the predetermined traffic path.
It is wherein, described to obtain predetermined traffic path, comprising:
It is recorded by the booking of the first terminal, obtains the predetermined traffic path.
Wherein, the booking record includes that the record of purchase train ticket, the record for buying subway platform ticket and purchase are public At least one of the record of platform ticket is handed over, the predetermined traffic path includes: departure place, destination, initial time and arrives Up to the time.
It is wherein, described to obtain predetermined traffic path, comprising:
The daily trip of counting user analyzes the fixed journey system of the user;
Period and the section of the fixed journey system are obtained, the period of the fixed journey system and section are described Predetermined traffic path.
Wherein, it if the first terminal deviates predetermined traffic path in current time, its current position, issues Prompt information, comprising:
If the first terminal deviates predetermined traffic path in current time, its current position, lasting mention is issued Show signal.
Wherein, the method also includes:
If the first terminal receives the first input information to match with default input information within a preset time, Cancel the prompt information;
Believe if the first terminal is not received by the first input to match with default input information within a preset time Breath then issues prompt information to authorized user, and the prompt information includes the current position of the first terminal.
Wherein, the method also includes:
While issuing the lasting standby signal, automatically by the picture of camera shooting active user;
If the first terminal be not received by within a preset time match with default input information it is first defeated Enter information, then issue prompt information to authorized user, comprising:
Believe if the first terminal is not received by the first input to match with default input information within a preset time Breath then issues prompt information to authorized user, and the prompt information includes the current position of the first terminal and the camera shooting The picture of head shooting.
In order to solve the above technical problems, another technical solution that the application uses is: providing a kind of terminal, including processing Device, memory and telecommunication circuit, the processor are respectively coupled to the memory and the telecommunication circuit, the processor Itself and the memory, the telecommunication circuit are controlled at work realizes step in above-mentioned terminal anti-theft method.
In order to solve the above technical problems, another technical solution that the application uses is: providing a kind of with store function Device, be stored with program data, described program data can be performed to realize the step in above-mentioned terminal anti-theft method.
The beneficial effect of the application is: being in contrast to the prior art, the terminal anti-theft method in the application includes: prison Control the current position of first terminal;If first terminal deviates predetermined traffic path in current time, its current position, issue Prompt information, to prompt first terminal to be currently likely to be at stolen status, predetermined traffic path includes between period and section Corresponding relationship.This method is positioned by the position to current first terminal, and it is pre- to judge whether it deviates in current time Determine traffic path, if deviating from predetermined traffic path, infer that first terminal is likely to be at stolen status, issue prompt information, So as to find that first terminal is likely to be at stolen status in time, the time is saved to give first terminal for change, and to correlation User prompts, and reduces the case where terminal is stolen.
Detailed description of the invention
In order to more clearly explain the technical solutions in the embodiments of the present application, make required in being described below to embodiment Attached drawing is briefly described, it should be apparent that, the drawings in the following description are only some examples of the present application, for For those of ordinary skill in the art, without creative efforts, it can also be obtained according to these attached drawings other Attached drawing.Wherein:
Fig. 1 is the flow diagram of one embodiment of the application terminal anti-theft method;
Fig. 2 is the flow diagram of another embodiment of the application terminal anti-theft method;
Fig. 3 is flow diagram of the step S120 in an application scenarios in Fig. 2;
Fig. 4 is the flow diagram of the another embodiment of the application terminal anti-theft method;
Fig. 5 is the flow diagram of the application terminal anti-theft method a further embodiment;
Fig. 6 is the structural schematic diagram of one embodiment of the application terminal;
Fig. 7 is the structural schematic diagram for one embodiment of device that the application has store function.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of embodiments of the present application, rather than whole embodiments.Based on this Embodiment in application, those of ordinary skill in the art are obtained every other under the premise of not making creative labor Embodiment shall fall in the protection scope of this application.
Refering to fig. 1, Fig. 1 is the flow diagram of one embodiment of the application terminal anti-theft method, in the present embodiment, This method comprises:
S100: the current position of monitoring first terminal.
Wherein, first terminal can be the electronic equipments such as mobile phone, tablet computer, electronic watch, and monitoring first terminal is current Position can be by terminal system automatic trigger, such as preset in terminal system the current position of monitoring first terminal Trigger condition, the trigger condition can be when be related on first terminal wealth, privacy content when, such as using Alipay, Wechat is paid the bill, and checks the private content being stored on first terminal;When can be the position of terminal and changing;It can be When terminal is switched on;It can be in predetermined time period;It can be every certain time interval detection once, such as every 15 Minute, every half an hour or other any customized time intervals;Monitoring first terminal can not certainly be preset The trigger condition of current position, but monitor the current position of first terminal in real time.
It is understood that the current position of monitoring first terminal can not also by terminal system automatic trigger, but The current position of first terminal is monitored after receiving the instruction of user, for example, user avoids terminal in the how crowded environment of people When stolen and opening anti-theft mode, first terminal is triggered and monitors the current position of first terminal.
Wherein, current position can be the GPS coordinate position where current first terminal, or current first eventually Substantially positioning where holding, such as the mark building positioning that first terminal is close.
S110: if first terminal deviates predetermined traffic path in current time, its current position, prompt letter is issued Breath, to prompt first terminal to be currently likely to be at stolen status, predetermined traffic path includes corresponding between period and section Relationship.
Predetermined traffic path is the traffic path of user's plan, period including trip and corresponding with the period Section.Wherein, a period can only correspond to a section, can also correspond to multiple sections.
After getting the current position of first terminal, the period with period where current time/neighbouring is found out Corresponding section judges the current position of first terminal whether on the section, or whether near the section, if The current position of one terminal is not on the section, or not near the section, then it is assumed that first terminal deviate it is predetermined go out walking along the street Line.When judging that first terminal deviates predetermined traffic path, show the current holder of first terminal not in accordance with being planned out Row, it may occur however that the stolen situation of first terminal, first terminal issues prompt information at this time, which can be used for mentioning Show that the human hair of surrounding goes out the terminal of the prompt information and is likely to be at the state being stolen, the people of surrounding is allowed to enhance your vigilance, it can also be with For prompting the real owner of first terminal, so that it can give first terminal for change in Best Times, or can also use In prompt, the stolen situation of terminal is had occurred in police personnel.
From the above, it is seen that on the one hand the above method judges first by the current position of monitoring first terminal Whether terminal currently deviates predetermined traffic path, to infer whether first terminal is in stolen state, to send out in time Existing first terminal is likely to be at stolen status, saves the time to give first terminal for change, on the other hand when deduction first terminal may When in stolen status, prompt information is issued, which can be used in that first terminal is prompted to be likely to be at stolen status, from Occur in the ignorant situation of user institute without being stolen first terminal, certain fright can be played to stealer and is made With reducing first terminal the case where being stolen.
In an application scenarios, in order to avoid the leakage of first terminal information can also while issuing prompt information Locking first terminal is user can not operate again to first terminal and content is checked, specifically, can allow first Terminal is constantly in the state of screen locking or blank screen, or locks to the partial software on first terminal, such as locking branch Fu Bao, wechat etc. are related to the software of wealth.
In an application scenarios, to avoid user's interim feelings that are busy and accidentally issuing prompt information in travel time section Condition, such as user's temporary needs judge whether first terminal deviates predetermined traffic path at this time to group refueling in order to improve Accuracy does not issue prompt immediately and believes when finding first terminal when predetermined traffic path is deviateed in current time, its current location Breath, and it is to continue with judge whether first terminal is returned in the given time on the section in predetermined traffic path, if returning to predetermined On section in traffic path, then prompt information will not be issued, if being not returned in predetermined traffic path in the given time On section, then prompt information is issued.
Referring to Fig.2, Fig. 2 is the flow diagram of another embodiment of the application terminal anti-theft method, preferably In, terminal anti-theft method includes:
S120: predetermined traffic path is obtained.
S100: the current position of monitoring first terminal.
Step S100 and the step S100 in above embodiment are same or similar, are detailed in and can be found in above embodiment, Details are not described herein.
S110: if first terminal deviates predetermined traffic path in current time, its current position, prompt letter is issued Breath, to prompt first terminal to be currently likely to be at stolen status, predetermined traffic path includes corresponding between period and section Relationship.
Step S110 and the step S110 in above embodiment are corresponding same or similar, are detailed in above embodiment, This is repeated no more.
Predetermined traffic path in step S120 is the plan of travel of user, shows that user will go in a certain period of time The section sailed, period and section corresponding with the period including user's trip.
Wherein, obtaining the current position of first terminal can be pre- by terminal system automatic trigger, such as in terminal system First setting obtains the trigger condition of predetermined traffic path, when which can be switched on terminal;It can be when certain Between interval acquiring it is primary, such as every 15 minutes, every half an hour or other any customized time intervals;Or detection When changing to the position of terminal;Or detect that user will go on a journey, such as detect that user uses such as Baidu map When equal softwares carry out position navigation.
It is understood that obtaining predetermined traffic path can not also received by terminal system automatic trigger Preparatory traffic path is obtained after the instruction of user, for example, user in the how crowded environment of people, avoids terminal stolen and opens When anti-theft modes, first terminal is triggered and obtains predetermined traffic path.
In an application scenarios, step S120 is specifically included:
S121: it is recorded by the booking of first terminal, obtains predetermined traffic path.
So that the function of terminal is stronger and stronger, the clothing, food, lodging and transportion -- basic necessities of life of user can lean on terminal substantially for the development of science and technology at present It completes, for example, being fitted with the application software that bus house keeper, intelligence row etc. are used to buy ticket in many terminals now. By these application software, user can purchase ticket, therefore the ticket bought in these application software by user in advance, Available predetermined traffic path.
Wherein, booking is recorded as the record of purchase train ticket, the record for buying subway platform ticket and purchase bus platform At least one of ticket, predetermined traffic path include: departure place, destination, initial time and arrival time.
Specifically, by buying the record of train ticket or buying the record or purchase bus platform ticket of subway platform ticket Record, obtain predetermined traffic path;Or in combination with the note of purchase train ticket, the record for buying subway platform ticket, purchase Two or three of record in the record of bus platform ticket, obtains predetermined traffic path.For example, buying train ticket by user The record of the record or purchase bus platform ticket of record or purchase subway platform ticket, first terminal obtain going out for user's trip Ground, destination, initial time and arrival time are sent out, after getting departure place and destination, first terminal obtains automatically Several potential routes from the departure place to destination, to being disposed as several potential routes from initial time to when reaching Between period corresponding in section.
For ease of understanding, specific example is enumerated herein.
In an application scenarios, user has purchased 9 thirty of the morning from Shen Zhenbei on first terminal in advance, and 10 Thirty, first terminal obtained several routes in the south from Shenzhen north to Guangzhou automatically, by these types of route pair to the ticket in Guangzhou south It should be set as corresponding to the section of the period, to get the predetermined traffic path of user.
In another application scene, first terminal gets user and has purchased 12 points of the morning vehicles from Shenzhen northern station Ticket, when detecting user at 10 points of the morning using first terminal barcode scanning and entering the information of Window on the World subway station, first terminal The route is set corresponding 10 points to the 12 points periods by the automatic route for obtaining the north from Window on the World subway station to Shenzhen Section, to obtain the traffic path of user.
In another application scenarios, by the positioning to first terminal, infer that user prepares to take bus, when detecting When the positioning of first terminal changes, the vehicle for being currently entering the bus platform, and root are known by the public transit system of networking According to the previous trip record of user, bus and traffic path that the user of first terminal currently takes are inferred to, to obtain Take predetermined traffic path.
Certainly, in other application scenarios, first terminal can also be in combination with the service condition of application software and each Kind ticket record, analyzes the predetermined traffic path of user, to obtain predetermined traffic path.Or by first terminal Taxi-hailing software, such as drop are dripped, also the predetermined travel route of available user.
It is understood that predetermined traffic path is also possible to voluntarily be inputted by user, herein with no restrictions.
In another application scene, as shown in figure 3, step S120 can also be specifically included:
S122: the daily trip of counting user analyzes the fixed journey system of user.
It is all different that the daily trip of user, which is not daily, it is understood that there may be certain regularity, such as one For a office worker, the time point of working, next time point, the route of working, next route are essentially identical;For big For student, school timetable weekly, the classroom attended class are substantially all identical.Therefore pass through the daily trip of counting user, Ke Yifen Some fixed journey systems of user are precipitated.Specifically, by user using use can be counted on first terminal the case where software application The daily trip at family, for example, the daily trip of the case where using map software, taxi-hailing software by user counting user;And or Person counts the daily trip of user, after counting the daily trip of user, with big by positioning in real time to user Data analyze the fixed journey system of user.
S123: obtaining period and the section of fixed journey system, and the period of fixed journey system and section are as made in advance Walking along the street line.
The period of fixed journey system and section are either one-to-one relationship, is also possible to one-to-many relationship.For example, User is ranked up in several sections that certain time period often travels, when choosing the more several sections of travel times with this Between section be correspondingly arranged, to get period and the section of fixed journey system.When the period for getting fixed journey system And behind section, predetermined traffic path is set by the period of fixed journey system and section.
In the present embodiment, by obtaining predetermined traffic path, it is pre- to judge whether the position of current first terminal deviates Determine traffic path, to find that first terminal is likely to be at stolen state in time, facilitates user in Best Times by One terminal is given for change.
It is the flow diagram of the another embodiment of the application terminal anti-theft method refering to Fig. 4, Fig. 4, preferably In, terminal anti-theft method includes:
S100: the current position of monitoring first terminal.
It is same or similar with the step S100 in above embodiment, it is detailed in and can be found in above embodiment, herein no longer It repeats.
S111: if first terminal deviates predetermined traffic path in current time, its current position, lasting mention is issued Show signal.
Specifically, in this embodiment, prompt information is lasting standby signal, that is to say, that prompt information can continue For a period of time, for enhancing the reminding effect of prompt information.
In an application scenarios, which is alarm, plays the role of vigilant surrounding user.Specifically, the prompt Signal can be audible ringing signal, the e.g. lasting and special the tinkle of bells that is different from incoming ring tone, quarter-bell etc., around allowing User is known that the terminal for issuing the audio alarm is likely to be at stolen state after hearing the audible ringing signal, and or Person, the standby signal can be visual alarm, e.g. lasting flash lamp flashing.
S130: judge whether first terminal receives the first input to match with default input information within a preset time Information.
Preset time can be generated by system be also possible to be arranged by user oneself, such as can be 30 seconds or the One terminal is automatically generated according to the environment being presently in, such as when judging to need to issue lasting standby signal, and first eventually It detects current environment and preset time is determined, specifically according to the luminous intensity of the noisy degree of current environment or current environment in end Ground, when standby signal is audible ringing signal, current environment is more noisy, and preset time is longer, when standby signal is light report When alert signal, current environment is brighter, and preset time is longer, thus avoid because environment influence and user not it will be noted that prompt Information.Wherein first terminal can detect the luminous intensity and unlatching of current first terminal local environment by opening sensor devices The sound of microphone acquisition current environment and detect the noisy degree of current environment.
First input information can be the information such as password, fingerprint, gesture, face, limb action, and user can be in advance the In one terminal setting input information, if apart from first terminal issue prompt information preset time in, user have input with First input information of default input information matches, shows that first terminal is not stolen, then enters step S150, if in distance the One terminal issues in the preset time of prompt information, is not received by the first input information to match with default input information, Then show that a possibility that first terminal is stolen is larger, enters step S140.
Wherein, judge first input information whether with default input information match can according to first input information in advance If the similarity for inputting information judges, when the two similarity reaches preset threshold, judge first input information with preset it is defeated Enter information to match.
S140: prompt information is issued to authorized user, prompt information includes the current position of first terminal.
When first terminal is not received by the first input information to match with default input letter within a preset time, table The stolen probability of bright first terminal generation is larger, and the current position of first terminal is sent to authorized user at this time, on the one hand may be used To position to first terminal, convenient for finding stolen first terminal, authorized user first on the other hand can also be prompted eventually End is stolen, not readily believe the information issued from first terminal, avoid having dust thrown into the eyes.
Wherein, authorized user can bind with first terminal in advance, for example, in advance by information such as the numbers of authorized user It is tied on first terminal.Certainly, authorized user preparatory can not also bind with first terminal, but certain specific terminals, For example, authorized user is the terminal of the friend of first terminal user, at this time when first terminal in step s 130 is not default When receiving the first input information to match with default input information in the time, first terminal automatic identification is stored in first eventually The contact method of user friend on end will be prompted to the friend that information is sent to user according to the contact method.
It further include informing first terminal probably quilt into the prompt information of authorized user's sending in an application scenarios The text information of robber avoids it from having dust thrown into the eyes for directly informing authorized user.
In another application scene, in order to improve the probability for finding first terminal, first terminal can according to it is certain when Between be spaced to authorized user issue prompt information, which includes the current position of first terminal, so that authorized user can To obtain the motion profile of first terminal, stolen first terminal is correctly found.
S150: cancel prompt information.
When first terminal receives the first input information to match with default input letter within a preset time, show this When the case where wrong report has occurred, then cancel prompt information.
Certainly in other embodiments, which is also possible to disappear automatically after reaching the regular hour It loses, such as reaches 5 minutes or disappear automatically after ten minutes, avoid issuing the electricity that prompt information depletes first terminal for a long time Pond electricity is unfavorable for subsequent positioning first terminal.
In this embodiment, lasting mention on the one hand is issued when predetermined traffic path is deviateed in the position of first terminal Show signal, enhance the reminding effect of prompt information, on the other hand according to whether receiving within a preset time and default input letter The matched first input information of manner of breathing, it is determined whether issue prompt information to authorized user, reduce the case where judging by accident, simultaneously The prompt information includes the current position of first terminal, improves the probability for giving first terminal for change.
It is the flow diagram of the application terminal anti-theft method a further embodiment refering to Fig. 5, Fig. 5, preferably In, terminal anti-theft method includes:
S100: the current position of monitoring first terminal.
It is corresponding same or similar with the step S100 in above embodiment, it is detailed in and can be found in above embodiment, herein It repeats no more.
S112: if first terminal deviates predetermined traffic path in current time, its current position, lasting mention is issued Show signal, and automatically by the picture of camera shooting active user.
It is different from the embodiment described above, it, can also be certainly in present embodiment while issuing lasting standby signal The dynamic picture that active user is shot by camera.
By shooting the picture of active user, strong evidence can be provided for the crime of confirmation in future criminal, In in order not to acting rashly and alerting the enemy, need the picture for shooting active user under silent environment specifically in shooting process, to be not turned on Other any prompt letters that flash lamp, focusing audio and shutter audio etc. can make active user realize that camera is being shot Number, the treatment process for shooting picture is also to be taken place without on the screen for being shown to first terminal in memory, guarantees entire shooting Process is all completed in silent environment.
Wherein, in order to take current user as much as possible, camera is shot according to certain time interval automatically, example As the shooting in primary, every 10 minutes of shooting in every 5 minutes is primary.It is influenced in first terminal in order to avoid blindly shooting again simultaneously It deposits, in an application scenarios, the camera of first terminal is repeatedly found a view, and detecting whether there is face image finding a view in camera It in range, will not then shoot if it does not exist, then judge whether the integrity degree of face image meets the requirements if it exists, if being unsatisfactory for wanting It asks, then will not shoot, continue to judge whether the clarity of face image meets the requirements if meeting, if being unsatisfactory for requiring, no It can shoot, shoot photo if meeting and be saved, that is to say, that obtain the effective of active user by repeatedly detecting shooting Picture.
S130: judge whether first terminal receives the first input to match with default input information within a preset time Information.
The step is same or like with the step S130 in above embodiment, is detailed in and can be found in above embodiment, This is repeated no more.
S141: prompt information is issued to authorized user, prompt information includes that the current position of first terminal and camera are clapped The picture taken the photograph.
It is different from the embodiment described above, in present embodiment, prompt information further include camera shooting picture, one Aspect in time can give first terminal for change within the effective time convenient for user, on the other hand be also convenient for arresting illegal point in the future Son.
S150: cancel standby signal.
It is same or like with the step S150 in above embodiment, it is detailed in and can be found in above embodiment, herein no longer It repeats.
In the present embodiment, by being shot when issuing lasting standby signal to the picture of active user, one Aspect can quickly find out criminal convenient for user after first terminal loss, on the other hand also can be to arrest in the future Criminal provides strong evidence.
It is the structural schematic diagram of one embodiment of the application terminal refering to Fig. 6, Fig. 6, the terminal in the application can be hand The electronic equipments such as machine, tablet computer, wrist-watch, herein with no restrictions.The terminal includes processor 61, memory 62 and communication electricity Road 63, processor 61 are respectively coupled to memory 62 and telecommunication circuit 63, and processor 61 controls itself and storage at work Device 62, telecommunication circuit 63 are to realize the step in the terminal anti-theft method in any of the above-described embodiment.
Specifically, processor 61 is by the current position of 63 monitor terminal of telecommunication circuit, if terminal is in current time, it works as The predetermined traffic path stored in memory 62 is deviateed in preceding position, then issues prompt information, at prompt terminal currently possibility In stolen status, wherein predetermined traffic path includes the corresponding relationship between period and section.
Wherein, processor 61 can be the current position of monitor terminal within a predetermined period of time, be also possible to according to certain The current position of time interval monitor terminal, can also be the position that monitor terminal is current after the instruction for receiving user, It can also be the current position of real-time monitoring terminal, herein with no restrictions.
Wherein, processor 61 also obtains predetermined traffic path by telecommunication circuit 63, and predetermined traffic path includes the period Corresponding relationship between section.Specifically, a period can only correspond to a section, can also correspond to multiple sections.
In an application scenarios, processor 61 is recorded by the booking of terminal, obtains predetermined traffic path.Booking record At least one in record including buying the record of train ticket, the record for buying subway platform ticket and purchase bus platform ticket Kind, predetermined traffic path includes: departure place, destination, initial time and arrival time.
In another application scene, the daily trip of 61 counting user of processor analyzes the fixed journey system of user;And it obtains Take period and the section of fixed journey system, wherein the period of fixed journey system and section are predetermined traffic path.
Wherein, processor 61 issues and continues when terminal deviates predetermined traffic path in current time, its current position Standby signal, which can be alarm, such as audible ringing signal, visual alarm, and if terminal default The the first input information to match with default input information is not received by time, then processor 61 is issued to authorized user and mentioned Show that information, prompt information include the current position of terminal.Specifically, processor 61 can be according to certain time interval to awarding It weighs user and issues prompt information.
For the ease of finding criminal, in an application scenarios, terminal further includes camera (not shown), processor 61 While issuing lasting standby signal, the picture of active user can be also shot automatically by camera, wherein can be The picture of active user is shot under silent environment by camera.And if terminal be not received by and preset within a preset time it is defeated Enter the first input information that information matches, processor 61 then issues prompt information to authorized user, and prompt information includes terminal The picture of current position and camera shooting.
Wherein, detailed terminal anti-theft method can be found in above embodiment, and details are not described herein.
It can be seen from the above content that on the one hand the terminal in the application judges terminal by the current position of monitor terminal Currently whether deviate predetermined traffic path, to infer whether terminal is in stolen state, so as to timely when terminal is stolen It was found that providing favourable conditions to give terminal for change, on the other hand when inferring that terminal is likely to be at stolen status, prompt letter is issued Breath, the prompt information can be used in prompt terminal and be likely to be at stolen status, do not known so that terminal will not be made to be stolen in user Occur in the case where road, certain fright can be played the role of to criminal, reduces the case where terminal is stolen.
It is the structural schematic diagram for one embodiment of device that the application has store function refering to Fig. 7, Fig. 7, in the implementation In mode, the device 70 with store function is stored with program data 71, and program data 71 can be performed to realize above-mentioned Step in one embodiment in terminal anti-theft method.
Wherein, the device 70 with store function can be portable storage media, such as USB flash disk, CD, be also possible to end End, server etc..
It can be seen from the above content that the application have store function device store program data can monitor terminal work as Preceding position and judge whether terminal currently deviates predetermined traffic path, to infer whether terminal is in stolen state, with Just found in time when terminal is stolen, provide favourable conditions to give terminal for change, on the other hand when infer terminal be likely to be at it is stolen When state, prompt information is issued, which can be used in prompt terminal and be likely to be at stolen status, to will not make terminal It is stolen and occurs in the ignorant situation of user institute, certain fright can be played the role of to criminal, it is stolen to reduce terminal The case where taking.
In several embodiments provided herein, it should be understood that disclosed method, terminal and device, it can be with It realizes by another way.For example, terminal structure embodiment described above is only schematical, for example, module Or the division of unit, only a kind of logical function partition, there may be another division manner in actual implementation, such as multiple lists Member or component can be combined or can be integrated into another system, or some features can be ignored or not executed.Another point, Shown or discussed mutual coupling, direct-coupling or communication connection can be through some interfaces, device or unit Indirect coupling or communication connection, can be electrical property, mechanical or other forms.
Unit may or may not be physically separated as illustrated by the separation member, shown as a unit Component may or may not be physical unit, it can and it is in one place, or may be distributed over multiple networks On unit.It can select some or all of unit therein according to the actual needs to realize the mesh of present embodiment scheme 's.
It, can also be in addition, each functional unit in each embodiment of the application can integrate in one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list Member both can take the form of hardware realization, can also realize in the form of software functional units.
The foregoing is merely presently filed embodiments, are not intended to limit the scope of the patents of the application, all to utilize this Equivalent structure or equivalent flow shift made by application specification and accompanying drawing content, it is relevant to be applied directly or indirectly in other Technical field similarly includes in the scope of patent protection of the application.

Claims (10)

1. a kind of terminal anti-theft method, which is characterized in that the described method includes:
Monitor the current position of first terminal;
If the first terminal deviates predetermined traffic path in current time, its current position, prompt information is issued, to mention Show that the first terminal is currently likely to be at stolen status, the predetermined traffic path includes corresponding between period and section Relationship.
2. the method according to claim 1, wherein the method also includes:
Obtain the predetermined traffic path.
3. according to the method described in claim 2, it is characterized in that, described obtain predetermined traffic path, comprising:
It is recorded by the booking of the first terminal, obtains the predetermined traffic path.
4. according to the method described in claim 3, it is characterized in that, booking record includes the record of purchase train ticket, purchase It buys the record of subway platform ticket and buys at least one of the record of bus platform ticket, the predetermined traffic path includes: Departure place, destination, initial time and arrival time.
5. according to the method described in claim 2, it is characterized in that, described obtain predetermined traffic path, comprising:
The daily trip of counting user analyzes the fixed journey system of the user;
Period and the section of the fixed journey system are obtained, the period of the fixed journey system and section are described predetermined Traffic path.
If 6. the method according to claim 1, wherein the first terminal in current time, it is current Position deviate predetermined traffic path, then issue prompt information, comprising:
If the first terminal deviates predetermined traffic path in current time, its current position, lasting prompt letter is issued Number.
7. according to the method described in claim 6, it is characterized in that, the method also includes:
If the first terminal receives the first input information to match with default input information within a preset time, cancel The prompt information;
If the first terminal is not received by the first input information to match with default input information within a preset time, Prompt information is issued to authorized user, the prompt information includes the current position of the first terminal.
8. the method according to the description of claim 7 is characterized in that the method also includes:
While issuing the lasting standby signal, automatically by the picture of camera shooting active user;
Believe if the first terminal is not received by the first input to match with default input information within a preset time Breath then issues prompt information to authorized user, comprising:
If the first terminal is not received by the first input information to match with default input information within a preset time, Prompt information is issued to authorized user, the prompt information includes the current position of the first terminal and camera shooting Picture.
9. a kind of terminal, which is characterized in that including processor, memory and telecommunication circuit, the processor is respectively coupled to institute Memory and the telecommunication circuit are stated, the processor controls itself and the memory, communication electricity at work Realize the step as described in claim any one of 1-8 in terminal anti-theft method in road.
10. a kind of device with store function, which is characterized in that be stored with program data, described program data can be held Row is to realize the step as described in claim any one of 1-8 in terminal anti-theft method.
CN201810998251.1A 2018-08-29 2018-08-29 Terminal anti-theft method, terminal and the device with store function Withdrawn CN109190422A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810998251.1A CN109190422A (en) 2018-08-29 2018-08-29 Terminal anti-theft method, terminal and the device with store function

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810998251.1A CN109190422A (en) 2018-08-29 2018-08-29 Terminal anti-theft method, terminal and the device with store function

Publications (1)

Publication Number Publication Date
CN109190422A true CN109190422A (en) 2019-01-11

Family

ID=64916520

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810998251.1A Withdrawn CN109190422A (en) 2018-08-29 2018-08-29 Terminal anti-theft method, terminal and the device with store function

Country Status (1)

Country Link
CN (1) CN109190422A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111677406A (en) * 2020-06-11 2020-09-18 中国银行股份有限公司 Monitoring method of bank tail box and related equipment
CN114360230A (en) * 2021-09-24 2022-04-15 深圳市卡联科技股份有限公司 Bus safety early warning method, system, device and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103957322A (en) * 2014-05-05 2014-07-30 深圳市中兴移动通信有限公司 Mobile terminal and antitheft method thereof
CN105847562A (en) * 2016-03-29 2016-08-10 乐视控股(北京)有限公司 Anti-theft method and device for intelligent terminal
CN106778393A (en) * 2016-12-23 2017-05-31 维沃移动通信有限公司 A kind of information processing method and mobile terminal
CN107292208A (en) * 2016-04-11 2017-10-24 中兴通讯股份有限公司 Guarding against theft for mobile terminal steals method and device
CN107577968A (en) * 2017-09-05 2018-01-12 深圳支点电子智能科技有限公司 A kind of mobile terminal is stolen processing method and mobile terminal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103957322A (en) * 2014-05-05 2014-07-30 深圳市中兴移动通信有限公司 Mobile terminal and antitheft method thereof
CN105847562A (en) * 2016-03-29 2016-08-10 乐视控股(北京)有限公司 Anti-theft method and device for intelligent terminal
CN107292208A (en) * 2016-04-11 2017-10-24 中兴通讯股份有限公司 Guarding against theft for mobile terminal steals method and device
CN106778393A (en) * 2016-12-23 2017-05-31 维沃移动通信有限公司 A kind of information processing method and mobile terminal
CN107577968A (en) * 2017-09-05 2018-01-12 深圳支点电子智能科技有限公司 A kind of mobile terminal is stolen processing method and mobile terminal

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111677406A (en) * 2020-06-11 2020-09-18 中国银行股份有限公司 Monitoring method of bank tail box and related equipment
CN114360230A (en) * 2021-09-24 2022-04-15 深圳市卡联科技股份有限公司 Bus safety early warning method, system, device and storage medium
CN114360230B (en) * 2021-09-24 2024-02-02 深圳市卡联科技股份有限公司 Bus safety early warning method, system, device and storage medium

Similar Documents

Publication Publication Date Title
US8977230B2 (en) Interactive personal surveillance and security (IPSS) systems and methods
US8559914B2 (en) Interactive personal surveillance and security (IPSS) system
US10861307B2 (en) Systems and methods for monitoring for and preempting pre-identified restriction violation-related behavior(s) of persons under restriction
US9332390B1 (en) Mobile device utilizing time of flight for personal security and localization
US8768294B2 (en) Notification and tracking system for mobile devices
US8630820B2 (en) Methods and systems for threat assessment, safety management, and monitoring of individuals and groups
CN102622861B (en) Security monitoring alarm system based on geographical position and method therefor
US10109173B2 (en) Person of interest location confirmation system
US20140118140A1 (en) Methods and systems for requesting the aid of security volunteers using a security network
US20160266733A1 (en) Event and staff management systems and methods
US9990831B2 (en) Home incarceration confirmation system
CN104488007B (en) Security network system and method
US20140120977A1 (en) Methods and systems for providing multiple coordinated safety responses
JP4891113B2 (en) Emergency call system with emergency call function and emergency response function
US20070279219A1 (en) Electronic proximity alarm device
JP4668014B2 (en) Security status notification device, security status notification method, and computer program for causing computer to execute security status notification method
US20090191850A1 (en) Alert Method, Apparatus, System and Program Product
Prashanth et al. Research and development of a mobile based women safety application with real-time database and data-stream network
WO2014072910A1 (en) Smart alarm system with user confirmed video stream notification of psap in combination with data safety and public emergency involvement using smartphone agents
KR20150092545A (en) Warning method and system using prompt situation information data
JP5900941B1 (en) Digital future now security system, method and program
JP2008203985A5 (en)
CN108449583A (en) Method, system, equipment and the storage medium mutually monitored between vehicle
CN109190422A (en) Terminal anti-theft method, terminal and the device with store function
Nellis Eternal vigilance Inc.: The satellite tracking of offenders in “real time”

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 518000 1-10 Floor, Building A2, Nanshan Zhiyuan, 1001 Xueyuan Avenue, Nanshan District, Shenzhen City, Guangdong Province

Applicant after: Our Internet Network Technology (Shenzhen) Co., Ltd.

Address before: 518000 1-10 Floor, Building A2, Nanshan Zhiyuan, 1001 Xueyuan Avenue, Shenzhen City, Guangdong Province

Applicant before: Our Internet Network Technology (Shenzhen) Co., Ltd.

CB02 Change of applicant information
WW01 Invention patent application withdrawn after publication

Application publication date: 20190111

WW01 Invention patent application withdrawn after publication