CN106797535A - Terminal and its antitheft tracing method and anti-theft tracking device - Google Patents

Terminal and its antitheft tracing method and anti-theft tracking device Download PDF

Info

Publication number
CN106797535A
CN106797535A CN201480081585.2A CN201480081585A CN106797535A CN 106797535 A CN106797535 A CN 106797535A CN 201480081585 A CN201480081585 A CN 201480081585A CN 106797535 A CN106797535 A CN 106797535A
Authority
CN
China
Prior art keywords
terminal
information
identification card
operation system
assigned operation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201480081585.2A
Other languages
Chinese (zh)
Inventor
艾浩峰
张涛
岳蓬星
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Coolpad Software Tech Shenzhen Co ltd
Original Assignee
Coolpad Software Tech Shenzhen Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Coolpad Software Tech Shenzhen Co ltd filed Critical Coolpad Software Tech Shenzhen Co ltd
Publication of CN106797535A publication Critical patent/CN106797535A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/725Cordless telephones

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a kind of antitheft tracing method of terminal, terminal includes multiple operating systems, including:When in starting up of terminal or having detected identification card and inserted in terminal, select assigned operation system to read the information of current identification card from multiple operating systems, and judge whether the identification card in terminal is replaced according to the information of current identification card;When identification card is replaced, assigned operation system carries out subscriber authentication;When subscriber authentication fails, the communication information stored in other operating systems in the positional information of acquisition terminal and multiple operating systems;The data service of terminal is automatically turned on, and trial sends to Cloud Server positional information and the communication information.Correspondingly, present invention also offers a kind of anti-theft tracking device of terminal.By the technical scheme, make the owner of terminal in the case where being separated with terminal, understand the real time status information of terminal, lift the security of terminal.

Description

Terminal and its antitheft tracing method and anti-theft tracking device Technical field
The present invention relates to field of terminal technology, in particular to a kind of antitheft tracing method of terminal, a kind of anti-theft tracking device of terminal and a kind of terminal.
Background technology
With the development of society, in the current mobile Internet epoch, increasing individual mobile terminal emerges in an endless stream, such as smart mobile phone, tablet personal computer, with making constant progress for mobile terminal, it has become communication tool essential in people's live and work, and user requires also more and more higher to the usage experience of mobile terminal.
With the raising of mobile terminal quality and price, its stolen probability is also greatly increased, and related art scheme is had at present and proposes anti-theft tracking scheme with regard to single-system terminals.And it is current, some users install dual system in terminal, and the dual system includes conventional system and security system (Permission Levels of security system are higher than conventional system).And for this dual system termi-nal, not corresponding anti-theft tracking scheme.
Therefore, how to solve the problems, such as the anti-theft tracking of dual system termi-nal turns into technical problem urgently to be resolved hurrily at present.
The content of the invention
The present invention is based on above mentioned problem, it is proposed that a kind of new technical scheme, can carry out anti-theft tracking to terminal after terminal is stolen or is lost.
In view of this, the present invention proposes a kind of antitheft tracing method of terminal, and the terminal includes multiple operating systems, including:In the starting up of terminal or when having detected identification card insertion in the terminal, assigned operation system is selected from the multiple operating system to read the information of current identification card, and judges whether the identification card in the terminal is replaced according to the information of the current identification card;When judged result is that the identification card is replaced, the assigned operation system pair The user of the terminal carries out subscriber authentication;When subscriber authentication fails, the communication information stored in the positional information and the multiple operating system of the assigned operation system acquisition terminal in other operating systems;The assigned operation system automatically turns on the data service of the terminal, and attempts to send the positional information and the communication information to Cloud Server.
In the technical scheme, in multisystem terminal, in starting up of terminal or when having detected identification card insertion in terminal, use assigned operation system, such as the SOS in dual system termi-nal, obtain the information of the identification card in terminal, and then judge whether identification card is replaced, when identification card is replaced, identity to the user of terminal is verified, and according to subscriber authentication result, choose whether to obtain the communication information in other operating systems, such as when subscriber authentication fails, obtain the communication information, and then automatically turn on data service, and sent the communication information into Cloud Server by the account in high in the clouds.Specifically, the communication information includes the information such as positional information, the address list in operating system, the message registration of terminal.And the assigned operation system can both be selected by terminal selection or terminal according to the selection instruction of user.So, when terminal is stolen or is lost, if thief or when picking up the user of terminal the identification card of oneself being inserted into terminal, the owner of terminal can obtain the positional information and address list information etc. of thief or the person of picking up by logging in Cloud Server, so that the owner of terminal with terminal in the case where separating, understand the real time status information of terminal, the security of terminal is lifted, so as to improve the usage experience of user.
In the above-mentioned technical solutions, it is preferable that the assigned operation system carries out subscriber authentication, specifically includes:Gather finger print information, voiceprint, head image information and/or the cornea information of the user of the terminal, judge whether the finger print information, voiceprint, head image information and/or cornea information match with default finger print information, voiceprint, head image information and/or cornea information, when judged result is no, judge subscriber authentication failure, otherwise, it is determined that subscriber authentication success;Or the user of the prompting terminal inputs the entrance key of the assigned operation system, and do not received in preset time and correctly enter key, or the number of times of the entrance key input error exceed preset times when, judge subscriber authentication failure, otherwise, it is determined that subscriber authentication success.
In the technical scheme, the mode that identity to user is verified includes but is not limited to gather the information such as finger print information, voiceprint, head image information and/or the cornea information of user, and then the information such as the information by collection and the finger print information stored before the owner of terminal, voiceprint, head image information and/or cornea information is matched, whether the user for judging terminal is owner.Certainly, If assigned operation system, which has been set, enters key, user can also be pointed out to input the entrance key of assigned operation system, user do not inputted in preset time it is correct enter key, or the number of times of input error is when exceeding preset times, now, illustrate user be not terminal owner possibility it is very big, now, the communication information for obtaining terminal uploads to Cloud Server, so that the owner of terminal with terminal in the case where separating, understand the real time status information of terminal, lift the security of terminal.
In the above-mentioned technical solutions, it is preferable that from the multiple operating system select assigned operation system, including:According to the level of security of the multiple operating system, operating system of the selection with level of security described in highest is used as the assigned operation system.
In the technical scheme, when selecting assigned operation system, level of security highest operating system (SOS in such as dual operating systems) can be selected from multiple operating systems, above-mentioned operations are performed by SOS, so as to ensure the safety of terminal user.Simultaneously as the operation of SOS, is sightless in other operation system interfaces, so that in the case of thief or the person of picking up are unwitting, it is possible to allow the owner of terminal to understand the status information of terminal.
In the above-mentioned technical solutions, it is preferable that judge whether the identification card in the terminal is replaced according to the information of the current identification card, specifically include:The assigned operation system reads the information of current identification card, and the information of at least one identification card by the information of the current identification card with storing is contrasted;When comparing result differs for the information and the information of each identification card in the information of at least one identification card described in storage of the current identification card, it is judged as that the identification card is replaced;When comparing result is identical with the information of any identification card in the information of at least one identification card described in storage for the information of the current identification card, it is judged as that the identification card is not replaced.
In the technical scheme, the owner of terminal may use different identification cards in different times, therefore, operation is sent in order to reduce the unnecessary communication information, the information of multiple identification cards can be stored in assigned operation system, when judging whether identification card is changed, judge whether identification card is replaced according to the information of multiple identification cards of storage.
In the above-mentioned technical solutions, it is preferable that also include:When being started shooting after the terminal inserts identification card first, the assigned operation system reads the information of current identification card, and stores the information of the current identification card.
In the technical scheme, after terminal inserts identification card first and starts shooting, terminal records this The information of identification card, and afterwards carry out identification card whether change judgement when, regard this identification card as a basis for estimation.Specifically, when not storing the information of identification card in terminal and Cloud Server, it is possible to determine that terminal is to insert identification card first.
In the above-mentioned technical solutions, it is preferable that also include:In subscriber authentication success, the information to the current identification card is stored, otherwise, and the information to the current identification card is not stored.
In the technical scheme, in subscriber authentication success, now, it is the owner of terminal to illustrate user, this time the replacing of identification card belongs to normal replacing, and now, the information of the identification card is stored, when carrying out the judgement whether identification card is changed so as to next time, this identification card is regard as a basis for estimation.
In the above-mentioned technical solutions, it is preferable that also include:After the information of current identification card described in the terminal storage, judge whether the assigned operation system logs in the account of the Cloud Server;When detecting the account of Cloud Server described in the assigned operation system login, the information of the current identification card of storage is sent to the Cloud Server.
In the above-mentioned technical solutions, it is preferable that also include:Before the data service of the terminal is automatically turned on, judge whether the terminal is in open state;When judged result is that the terminal is not in the open state, the terminal is automatically turned on.
In the technical scheme, user identity identification is carried out in terminal, or when obtaining the communication information, terminal user may close a terminal, in the process, if terminal closedown, assigned operation system can be with Auto Power On, data service is automatically turned on after powering, and then send the communication information to server, so, in the case of terminal closedown, user still can be appreciated that the real time status information of terminal, further improve the security of terminal.
According to another aspect of the present invention, a kind of anti-theft tracking device of terminal is additionally provided, the terminal includes multiple operating systems, and the anti-theft tracking device of terminal includes:Processing unit, in the starting up of terminal or when having detected identification card insertion in the terminal, assigned operation system is selected from the multiple operating system to read the information of current identification card, and judges whether the identification card in the terminal is replaced according to the information of the current identification card;Authentication unit, when judged result is that the identification card is replaced, controls the assigned operation system to carry out subscriber authentication;Acquiring unit, when subscriber authentication fails, controls the assigned operation system to obtain described The communication information of other operating systems in the positional information of terminal and the multiple operating system;Interactive unit, controls the assigned operation system to automatically turn on the data service of the terminal, and attempts to send the positional information and the communication information to Cloud Server.
In the technical scheme, in multisystem terminal, in starting up of terminal or when having detected identification card insertion in terminal, use assigned operation system, such as the SOS in dual system termi-nal, obtain the information of the identification card in terminal, and then judge whether identification card is replaced, when identification card is replaced, identity to the user of terminal is verified, and according to subscriber authentication result, choose whether to obtain the communication information in other operating systems, such as when subscriber authentication fails, obtain the communication information, and then automatically turn on data service, and sent the communication information into Cloud Server by the account in high in the clouds.Specifically, the communication information includes the information such as positional information, the address list in operating system, the message registration of terminal.And the assigned operation system can both be selected by terminal selection or terminal according to the selection instruction of user.So, when terminal is stolen or is lost, if thief or when picking up the user of terminal the identification card of oneself being inserted into terminal, the owner of terminal can obtain the positional information and address list information etc. of thief or the person of picking up by logging in Cloud Server, so that the owner of terminal with terminal in the case where separating, understand the real time status information of terminal, the security of terminal is lifted, so as to improve the usage experience of user.
In the above-mentioned technical solutions, it is preferable that the authentication unit specifically for:Gather finger print information, voiceprint, head image information and/or the cornea information of the user of the terminal, judge whether the finger print information, voiceprint, head image information and/or cornea information match with default finger print information, voiceprint, head image information and/or cornea information, when judged result is no, judge subscriber authentication failure, otherwise, it is determined that subscriber authentication success;Or the user of the prompting terminal inputs the entrance key of the assigned operation system, and do not received in preset time and correctly enter key, or the number of times of the entrance key input error exceed preset times when, judge subscriber authentication failure, otherwise, it is determined that subscriber authentication success.
In the technical scheme, the mode that identity to user is verified includes but is not limited to gather the information such as finger print information, voiceprint, head image information and/or the cornea information of user, and then the information such as the information by collection and the finger print information stored before the owner of terminal, voiceprint, head image information and/or cornea information is matched, whether the user for judging terminal is owner.Certainly, if assigned operation system, which has been set, enters key, user can also be pointed out to input assigned operation system Into key, do not inputted in preset time in user and correctly enter key, or the number of times of input error exceed preset times when, now, illustrate user be not terminal owner possibility it is very big, now, the communication information for obtaining terminal uploads to Cloud Server, so that the owner of terminal with terminal in the case where separating, the real time status information of terminal is understood, lift the security of terminal.
In the above-mentioned technical solutions, it is preferable that the processing unit includes:Selecting unit, according to the level of security of the multiple operating system, operating system of the selection with level of security described in highest is used as the assigned operation system.
In the technical scheme, when selecting assigned operation system, level of security highest operating system (SOS in such as dual operating systems) can be selected from multiple operating systems, above-mentioned operations are performed by SOS, so as to ensure the safety of terminal user.Simultaneously as the operation of SOS, is sightless in other operation system interfaces, so that in the case of thief or the person of picking up are unwitting, it is possible to allow the owner of terminal to understand the status information of terminal.
In the above-mentioned technical solutions, it is preferable that the processing unit includes:Comparison unit, the assigned operation system reads the information of current identification card, and the information of at least one identification card by the information of the current identification card with storing is contrasted;Judging unit, when comparing result differs for the information and the information of each identification card in the information of at least one identification card described in storage of the current identification card, it is judged as that the identification card is replaced, when comparing result is identical with the information of any identification card in the information of at least one identification card described in storage for the information of the current identification card, it is judged as that the identification card is not replaced.
In the technical scheme, the owner of terminal may use different identification cards in different times, therefore, operation is sent in order to reduce the unnecessary communication information, the information of multiple identification cards can be stored in assigned operation system, when judging whether identification card is changed, judge whether identification card is replaced according to the information of multiple identification cards of storage.
In the above-mentioned technical solutions, it is preferable that also include:First memory cell, when being started shooting after the terminal inserts identification card first, controls the assigned operation system to read the information of current identification card, and store the information of the current identification card.
In the technical scheme, after terminal inserts identification card first and starts shooting, terminal records the information of this identification card, and when carrying out judgement that whether identification card is changed afterwards, regard this identification card as a basis for estimation.
In the above-mentioned technical solutions, it is preferable that also include:Second memory cell, in subscriber authentication success, the information to the current identification card is stored, otherwise, and the information to the current identification card is not stored.
In the technical scheme, in subscriber authentication success, now, it is the owner of terminal to illustrate user, this time the replacing of identification card belongs to normal replacing, and now, the information of the identification card is stored, when carrying out the judgement whether identification card is changed so as to next time, this identification card is regard as a basis for estimation.
In the above-mentioned technical solutions, it is preferable that also include:Logging status judging unit, after the information of current identification card described in the terminal storage, judges whether the assigned operation system logs in the account of the Cloud Server;And the interactive unit is additionally operable to:When detecting the account of Cloud Server described in the assigned operation system login, the information of the current identification card of storage is sent to the Cloud Server.
In the above-mentioned technical solutions, it is preferable that also include:Condition adjudgement unit, before the data service of the terminal is automatically turned on, judges whether the terminal is in open state;Opening unit, when judged result is that the terminal is not in the open state, automatically turns on the terminal.
In the technical scheme, user identity identification is carried out in terminal, or when obtaining the communication information, terminal user may close a terminal, in the process, if terminal closedown, assigned operation system can be with Auto Power On, data service is automatically turned on after powering, and then send the communication information to server, so, in the case of terminal closedown, user still can be appreciated that the real time status information of terminal, further improve the security of terminal.
In accordance with a further aspect of the present invention, a kind of terminal is additionally provided, including:Multiple operating systems;And the anti-theft tracking device of the terminal as any one of above-mentioned technical scheme.The terminal has the anti-theft tracking device identical technique effect with terminal, will not be repeated here.
Pass through above technical scheme, after terminal is stolen or is lost, the information such as position and the log of terminal can be obtained automatically, and then data service is automatically turned on, Cloud Server is uploaded to, so that user understands the real time status information of terminal, and in terminal closedown, can Auto Power On, execution aforesaid operations, so as to comprehensively improve the security of terminal.
Brief description of the drawings
Fig. 1 shows the flow chart of the antitheft tracing method of terminal according to an embodiment of the invention;
Fig. 2 shows the block diagram of the anti-theft tracking device of terminal according to an embodiment of the invention;
Fig. 3 shows the structure chart of terminal according to an embodiment of the invention;
Fig. 4 shows the structure chart of terminal according to an embodiment of the invention;
Fig. 5 shows the flow chart of setting system B security strategies according to an embodiment of the invention;
Fig. 6 shows the particular flow sheet of the antitheft tracing method of terminal according to an embodiment of the invention.
Embodiment
In order to be more clearly understood that the above objects, features and advantages of the present invention, the present invention is further described in detail with reference to the accompanying drawings and detailed description.It should be noted that in the case where not conflicting, the feature in embodiments herein and embodiment can be mutually combined.
Many details are elaborated in the following description to fully understand the present invention; but; the present invention can also be different from other modes described here to implement using other, and therefore, protection scope of the present invention is not limited by following public specific embodiment.
Fig. 1 shows the flow chart of the antitheft tracing method of terminal according to an embodiment of the invention.
As shown in figure 1, the antitheft tracing method of terminal according to an embodiment of the invention, including:Step 102, in the starting up of terminal or when having detected identification card insertion in the terminal, assigned operation system is selected from multiple operating systems of terminal to read the information of current identification card, and judges whether the identification card in the terminal is replaced according to the information of the current identification card;Step 104, when judged result is that the identification card is replaced, the assigned operation system carries out subscriber authentication;Step 106, when subscriber authentication fails, the communication information stored in the positional information and the multiple operating system of the terminal in other operating systems is obtained;Step 108, the assigned operation system automatically turns on the data service of the terminal, and attempts to send the positional information and the communication information to Cloud Server.
In the technical scheme, in multisystem terminal, in starting up of terminal or when having detected identification card insertion in terminal, using assigned operation system, the SOS in such as dual system termi-nal, Obtain the information of the identification card in terminal, and then judge whether identification card is replaced, when identification card is replaced, identity to the user of terminal is verified, and according to subscriber authentication result, chooses whether to obtain the communication information in other operating systems, such as when subscriber authentication fails, the communication information is obtained, and then automatically turns on data service, and is sent the communication information into Cloud Server by the account in high in the clouds.Specifically, the communication information includes the information such as positional information, the address list in operating system, the message registration of terminal.And the assigned operation system can both be selected by terminal selection or terminal according to the selection instruction of user.So, when terminal is stolen or is lost, if thief or when picking up the user of terminal the identification card of oneself being inserted into terminal, the owner of terminal can obtain the positional information and address list information etc. of thief or the person of picking up by logging in Cloud Server, so that the owner of terminal with terminal in the case where separating, understand the real time status information of terminal, the security of terminal is lifted, so as to improve the usage experience of user.
In the above-mentioned technical solutions, it is preferable that the assigned operation system carries out subscriber authentication, specifically includes:Gather finger print information, voiceprint, head image information and/or the cornea information of the user of the terminal, judge whether the finger print information, voiceprint, head image information and/or cornea information match with default finger print information, voiceprint, head image information and/or cornea information, when judged result is no, judge subscriber authentication failure, otherwise, it is determined that subscriber authentication success;Or the user of the prompting terminal inputs the entrance key of the assigned operation system, and do not received in preset time and correctly enter key, or the number of times of the entrance key input error exceed preset times when, judge subscriber authentication failure, otherwise, it is determined that subscriber authentication success.
In the technical scheme, the mode that identity to user is verified includes but is not limited to gather the information such as finger print information, voiceprint, head image information and/or the cornea information of user, and then the information such as the information by collection and the finger print information stored before the owner of terminal, voiceprint, head image information and/or cornea information is matched, whether the user for judging terminal is owner.Certainly, if assigned operation system, which has been set, enters key, user can also be pointed out to input the entrance key of assigned operation system, do not inputted in preset time in user and correctly enter key, or the number of times of input error exceed preset times when, now, illustrate user be not terminal owner possibility it is very big, now, the communication information for obtaining terminal uploads to Cloud Server, so that the owner of terminal with terminal in the case where separating, the real time status information of terminal is understood, lift the security of terminal.
In the above-mentioned technical solutions, it is preferable that assigned operation system is selected from the multiple operating system System, including:According to the level of security of the multiple operating system, operating system of the selection with level of security described in highest is used as the assigned operation system.
In the technical scheme, when selecting assigned operation system, level of security highest operating system (SOS in such as dual operating systems) can be selected from multiple operating systems, above-mentioned operations are performed by SOS, so as to ensure the safety of terminal user.Simultaneously as the operation of SOS, is sightless in other operation system interfaces, so that in the case of thief or the person of picking up are unwitting, it is possible to allow the owner of terminal to understand the status information of terminal.
In the above-mentioned technical solutions, it is preferable that judge whether the identification card in the terminal is replaced according to the information of the current identification card, specifically include:The assigned operation system reads the information of current identification card, and the information of at least one identification card by the information of the current identification card with storing is contrasted;When comparing result differs for the information and the information of each identification card in the information of at least one identification card described in storage of the current identification card, it is judged as that the identification card is replaced;When comparing result is identical with the information of any identification card in the information of at least one identification card described in storage for the information of the current identification card, it is judged as that the identification card is not replaced.
In the technical scheme, the owner of terminal may use different identification cards in different times, therefore, operation is sent in order to reduce the unnecessary communication information, the information of multiple identification cards can be stored in assigned operation system, when judging whether identification card is changed, judge whether identification card is replaced according to the information of multiple identification cards of storage.
In the above-mentioned technical solutions, it is preferable that also include before the step 102:When being started shooting after the terminal inserts identification card first, the assigned operation system reads the information of current identification card, and stores the information of the current identification card.
In the technical scheme, after terminal inserts identification card first and starts shooting, terminal records the information of this identification card, and when carrying out judgement that whether identification card is changed afterwards, regard this identification card as a basis for estimation.Specifically, when not storing the information of identification card in terminal and Cloud Server, it is possible to determine that terminal is to insert identification card first.
In the above-mentioned technical solutions, it is preferable that also include:In subscriber authentication success, the information to the current identification card is stored, otherwise, and the information to the current identification card is not stored.
In the technical scheme, in subscriber authentication success, now, it is the owner of terminal to illustrate user, this time the replacing of identification card belongs to normal replacing, and now, the information of the identification card is stored, when carrying out the judgement whether identification card is changed so as to next time, this identification card is regard as a basis for estimation.
In the above-mentioned technical solutions, it is preferable that also include:After the information of current identification card described in the terminal storage, judge whether the assigned operation system logs in the account of the Cloud Server;When detecting the account of Cloud Server described in the assigned operation system login, the information of the current identification card of storage is sent to the Cloud Server.
In the above-mentioned technical solutions, it is preferable that also include:Before the data service of the terminal is automatically turned on, judge whether the terminal is in open state;When judged result is that the terminal is not in the open state, the terminal is automatically turned on.
In the technical scheme, user identity identification is carried out in terminal, or when obtaining the communication information, terminal user may close a terminal, in the process, if terminal closedown, assigned operation system can be with Auto Power On, data service is automatically turned on after powering, and then send the communication information to server, so, in the case of terminal closedown, user still can be appreciated that the real time status information of terminal, further improve the security of terminal.
Fig. 2 shows the block diagram of the anti-theft tracking device of terminal according to an embodiment of the invention.
As shown in Fig. 2 the anti-theft tracking device 200 of terminal according to an embodiment of the invention, including:Processing unit 202, in the starting up of terminal or when having detected identification card insertion in the terminal, assigned operation system is selected from the multiple operating system to read the information of current identification card, and judges whether the identification card in the terminal is replaced according to the information of the current identification card;Authentication unit 204, when judged result is that the identification card is replaced, controls the assigned operation system to carry out subscriber authentication;Acquiring unit 206, when subscriber authentication fails, controls the assigned operation system to obtain the communication information of other operating systems in the positional information and the multiple operating system of the terminal;Interactive unit 208, controls the assigned operation system to automatically turn on the data service of the terminal, and attempts to send the positional information and the communication information to Cloud Server.
In the technical scheme, in multisystem terminal, in starting up of terminal or when having detected identification card insertion in terminal, using assigned operation system, the SOS in such as dual system termi-nal, Obtain the information of the identification card in terminal, and then judge whether identification card is replaced, when identification card is replaced, identity to the user of terminal is verified, and according to subscriber authentication result, chooses whether to obtain the communication information in other operating systems, such as when subscriber authentication fails, the communication information is obtained, and then automatically turns on data service, and is sent the communication information into Cloud Server by the account in high in the clouds.Specifically, the communication information includes the information such as positional information, the address list in operating system, the message registration of terminal.And the assigned operation system can both be selected by terminal selection or terminal according to the selection instruction of user.So, when terminal is stolen or is lost, if thief or when picking up the user of terminal the identification card of oneself being inserted into terminal, the owner of terminal can obtain the positional information and address list information etc. of thief or the person of picking up by logging in Cloud Server, so that the owner of terminal with terminal in the case where separating, understand the real time status information of terminal, the security of terminal is lifted, so as to improve the usage experience of user.
In the above-mentioned technical solutions, it is preferable that the authentication unit specifically for:Gather finger print information, voiceprint, head image information and/or the cornea information of the user of the terminal, judge whether the finger print information, voiceprint, head image information and/or cornea information match with default finger print information, voiceprint, head image information and/or cornea information, when judged result is no, judge subscriber authentication failure, otherwise, it is determined that subscriber authentication success;Or the user of the prompting terminal inputs the entrance key of the assigned operation system, and do not received in preset time and correctly enter key, or the number of times of the entrance key input error exceed preset times when, judge subscriber authentication failure, otherwise, it is determined that subscriber authentication success.
In the technical scheme, the mode that identity to user is verified includes but is not limited to gather the information such as finger print information, voiceprint, head image information and/or the cornea information of user, and then the information such as the information by collection and the finger print information stored before the owner of terminal, voiceprint, head image information and/or cornea information is matched, whether the user for judging terminal is owner.Certainly, if assigned operation system, which has been set, enters key, user can also be pointed out to input the entrance key of assigned operation system, do not inputted in preset time in user and correctly enter key, or the number of times of input error exceed preset times when, now, illustrate user be not terminal owner possibility it is very big, now, the communication information for obtaining terminal uploads to Cloud Server, so that the owner of terminal with terminal in the case where separating, the real time status information of terminal is understood, lift the security of terminal.
In the above-mentioned technical solutions, it is preferable that the processing unit 202 includes:Selecting unit 2022, according to the level of security of the multiple operating system, operating system of the selection with level of security described in highest is used as the assigned operation system.
In the technical scheme, when selecting assigned operation system, level of security highest operating system (SOS in such as dual operating systems) can be selected from multiple operating systems, above-mentioned operations are performed by SOS, so as to ensure the safety of terminal user.Simultaneously as the operation of SOS, is sightless in other operation system interfaces, so that in the case of thief or the person of picking up are unwitting, it is possible to allow the owner of terminal to understand the status information of terminal.
In the above-mentioned technical solutions, it is preferable that the processing unit 202 includes:Comparison unit 2024, the assigned operation system reads the information of current identification card, and the information of at least one identification card by the information of the current identification card with storing is contrasted;Judging unit 2046, when comparing result differs for the information and the information of each identification card in the information of at least one identification card described in storage of the current identification card, it is judged as that the identification card is replaced, when comparing result is identical with the information of any identification card in the information of at least one identification card described in storage for the information of the current identification card, it is judged as that the identification card is not replaced.
In the technical scheme, the owner of terminal may use different identification cards in different times, therefore, operation is sent in order to reduce the unnecessary communication information, the information of multiple identification cards can be stored in assigned operation system, when judging whether identification card is changed, judge whether identification card is replaced according to the information of multiple identification cards of storage.
In the above-mentioned technical solutions, it is preferable that also include:First memory cell 210, when being started shooting after the terminal inserts identification card first, controls the assigned operation system to read the information of current identification card, and store the information of the current identification card.
In the technical scheme, after terminal inserts identification card first and starts shooting, terminal records the information of this identification card, and when carrying out judgement that whether identification card is changed afterwards, regard this identification card as a basis for estimation.Specifically, when not storing the information of identification card in terminal and Cloud Server, it is possible to determine that terminal is to insert identification card first.
In the above-mentioned technical solutions, it is preferable that also include:Second memory cell 212, in subscriber authentication success, the information to the current identification card is stored, otherwise, and the information to the current identification card is not stored.
In the technical scheme, in subscriber authentication success, now, it is the owner of terminal to illustrate user, this time the replacing of identification card belongs to normal replacing, and now, the information of the identification card is stored, when carrying out the judgement whether identification card is changed so as to next time, this identification card is regard as a basis for estimation.
In the above-mentioned technical solutions, it is preferable that also include:Logging status judging unit 214, after the information of current identification card described in the terminal storage, judges whether the assigned operation system logs in the account of the Cloud Server;And the interactive unit 208 is additionally operable to:When detecting the account of Cloud Server described in the assigned operation system login, the information of the current identification card of storage is sent to the Cloud Server.
In the above-mentioned technical solutions, it is preferable that also include:Condition adjudgement unit 216, before the data service of the terminal is automatically turned on, judges whether the terminal is in open state;Opening unit 218, when judged result is that the terminal is not in the open state, automatically turns on the terminal.
In the technical scheme, user identity identification is carried out in terminal, or when obtaining the communication information, terminal user may close a terminal, in the process, if terminal closedown, assigned operation system can be with Auto Power On, data service is automatically turned on after powering, and then send the communication information to server, so, in the case of terminal closedown, user still can be appreciated that the real time status information of terminal, further improve the security of terminal.
Fig. 3 shows the structure chart of terminal according to an embodiment of the invention.
As shown in figure 3, terminal 300, multiple operating systems 302 according to an embodiment of the invention;And the anti-theft tracking device 200 of the terminal as any one of above-mentioned technical scheme.The terminal 300 has the identical technique effect of anti-theft tracking device 200 with terminal, will not be repeated here.
Below using terminal as dual system termi-nal (system A and system B, wherein, system B is that assigned operation system, i.e. system B are SOS) exemplified by, describe technical scheme in detail.
Fig. 4 shows the structure chart of terminal according to an embodiment of the invention.
As shown in figure 4, terminal 400 is that system A and system B are constituted by two systems.Wherein, system A is the daily use system of terminal user;System B is secure encryption system, and system B has detection SIM (Subscriber Identity Module, client identification module)/UIM (User Identity Module, subscriber identification module) whether card be replaced, switch data business, the function of reading system A logs and differentiate terminal seat reason other monitoring systems A such as position.So, when system B detects SIM/UIM cards and is replaced, the information such as monitoring system A log and acquisition terminal seat reason position, and then upload to Cloud Server, so that the owner of terminal with terminal in the case where separating, understand the real time status information of terminal, the security of terminal is lifted, so as to improve the usage experience of user.
Fig. 5 shows the flow chart for setting system B security strategies according to an embodiment of the invention.
As shown in figure 5, setting the flow of system B security strategies as follows according to an embodiment of the invention:
Step 502, it is initially opened terminal.
Step 504, SIM/UIM (i.e. identification card) card insertions are determined whether.
Step 506, if SIM/UIM cards are inserted, then the information of SIM/UIM cards and it is stored in system B reading terminals in system B.
Step 508, judge whether system B logs in high in the clouds account.
Step 510, if system B logs in high in the clouds account, SIM/UIM card relevant informations are uploaded to high in the clouds.
Fig. 6 shows the particular flow sheet of the antitheft tracing method of terminal according to an embodiment of the invention.
As shown in fig. 6, the antitheft tracing method of terminal according to an embodiment of the invention, including:
Step 602, open a terminal.
Step 604, system B judges whether SIM/UIM cards are replaced.When judged result is to be, into step 606, otherwise terminate flow.
Step 606, when the SIM/UIM cards of terminal, which are replaced, starts shooting again, system B judges whether terminal user is actively entered correct key and enters system B in preset time, when judged result is to be, into step 608, otherwise into step 610.
Step 610, if terminal user is actively entered correct key and enters system B in the given time, the process of the setting system B security strategies described in Fig. 5 is performed.
Step 612, if terminal user is not actively entered correct key and enters system in the given time United B, then system B switchs to always-on, i.e. system B is automatically turned on, and without correlation start prompting.
Step 614, system B is in backstage turn-on data business.
Step 616, system B automatically attempts to log in high in the clouds client, when logining successfully, into step 618, otherwise, into step 620.
Step 618, the log of the terminal, positional information, SIM/UIM card informations are uploaded to cloud server by system B by high in the clouds client.
Step 620, after delay a period of time, step 614 is reentered.
Pass through above-mentioned steps, the real time status information of terminal can be uploaded to Cloud Server, so, the owner of terminal logs in high in the clouds account, the information such as log, positional information and the SIM/UIM cards of the terminal of high in the clouds preservation can be read, and then these tracking of information terminal positions and the identity of terminal user can be passed through.
Technical scheme is described in detail above in association with accompanying drawing, pass through technical scheme, after terminal is stolen or is lost, the information such as position and the log of terminal can be obtained automatically, and then automatically turn on data service, uploaded to Cloud Server, so that user understands the real time status information of terminal, and in terminal closedown, energy Auto Power On, aforesaid operations are performed, so as to comprehensively improve the security of terminal.
According to the embodiment of the present invention, a kind of program product being stored in nonvolatile machine-readable media is additionally provided, for the anti-theft tracking of terminal, described program product includes the machine-executable instruction for being used to make computer system perform following steps:In the starting up of terminal or when having detected identification card insertion in the terminal, assigned operation system is selected from the multiple operating system to read the information of current identification card, and judges whether the identification card in the terminal is replaced according to the information of the current identification card;When judged result is that the identification card is replaced, the assigned operation system carries out subscriber authentication to the user of the terminal;When subscriber authentication fails, the communication information stored in the positional information and the multiple operating system of the assigned operation system acquisition terminal in other operating systems;The assigned operation system automatically turns on the data service of the terminal, and attempts to send the positional information and the communication information to Cloud Server.
According to the embodiment of the present invention, a kind of non-volatile machine readable media is additionally provided, be stored with the program product followed the trail of for terminal anti-theft, described program product includes the machine-executable instruction for being used to make computer system perform following steps:Identity has been detected in the starting up of terminal or in the terminal When identification card is inserted, assigned operation system is selected from the multiple operating system to read the information of current identification card, and judge whether the identification card in the terminal is replaced according to the information of the current identification card;When judged result is that the identification card is replaced, the assigned operation system carries out subscriber authentication to the user of the terminal;When subscriber authentication fails, the communication information stored in the positional information and the multiple operating system of the assigned operation system acquisition terminal in other operating systems;The assigned operation system automatically turns on the data service of the terminal, and attempts to send the positional information and the communication information to Cloud Server.
According to the embodiment of the present invention, a kind of machine readable program is additionally provided, described program makes the antitheft tracing method of any described terminal in machine execution technical scheme as described above.
According to the embodiment of the present invention, a kind of storage medium for the machine readable program that is stored with is additionally provided, wherein, the machine readable program causes machine to perform the antitheft tracing method of any described terminal in technical scheme as described above.
The preferred embodiments of the present invention are the foregoing is only, are not intended to limit the invention, for those skilled in the art, the present invention there can be various modifications and variations.Within the spirit and principles of the invention, any modification, equivalent substitution and improvements made etc., should be included in the scope of the protection.

Claims (17)

  1. A kind of antitheft tracing method of terminal, the terminal includes multiple operating systems, it is characterised in that including:
    In the starting up of terminal or when having detected identification card insertion in the terminal, assigned operation system is selected from the multiple operating system to read the information of current identification card, and judges whether the identification card in the terminal is replaced according to the information of the current identification card;
    When judged result is that the identification card is replaced, the assigned operation system carries out subscriber authentication to the user of the terminal;
    When subscriber authentication fails, the communication information stored in the positional information and the multiple operating system of the assigned operation system acquisition terminal in other operating systems;
    The assigned operation system automatically turns on the data service of the terminal, and attempts to send the positional information and the communication information to Cloud Server.
  2. The antitheft tracing method of terminal according to claim 1, it is characterised in that the assigned operation system carries out subscriber authentication, specifically includes:
    Gather finger print information, voiceprint, head image information and/or the cornea information of the user of the terminal, judge whether the finger print information, voiceprint, head image information and/or cornea information match with default finger print information, voiceprint, head image information and/or cornea information, when judged result is no, judge subscriber authentication failure, otherwise, it is determined that subscriber authentication success;Or
    The user of the terminal is pointed out to input the entrance key of the assigned operation system, and
    Do not received in preset time it is correct enter key, or the number of times of the entrance key input error is when exceeding preset times, subscriber authentication failure is judged, otherwise, it is determined that subscriber authentication success.
  3. The antitheft tracing method of terminal according to claim 1, it is characterised in that assigned operation system is selected from the multiple operating system, including:
    According to the level of security of the multiple operating system, operating system of the selection with level of security described in highest is used as the assigned operation system.
  4. The antitheft tracing method of terminal according to claim 1, it is characterised in that judge whether the identification card in the terminal is replaced according to the information of the current identification card, tool Body includes:
    The assigned operation system reads the information of current identification card, and the information of at least one identification card by the information of the current identification card with storing is contrasted;
    When comparing result differs for the information and the information of each identification card in the information of at least one identification card described in storage of the current identification card, it is judged as that the identification card is replaced;
    When comparing result is identical with the information of any identification card in the information of at least one identification card described in storage for the information of the current identification card, it is judged as that the identification card is not replaced.
  5. The antitheft tracing method of terminal according to claim 4, it is characterised in that also include:
    When being started shooting after the terminal inserts identification card first, the assigned operation system reads the information of current identification card, and stores the information of the current identification card.
  6. The antitheft tracing method of terminal according to claim 4, it is characterised in that also include:
    In subscriber authentication success, the information to the current identification card is stored, otherwise, and the information to the current identification card is not stored.
  7. The antitheft tracing method of terminal according to claim 5 or 6, it is characterised in that also include:
    After the information of current identification card described in the terminal storage, judge whether the assigned operation system logs in the account of the Cloud Server;
    When detecting the account of Cloud Server described in the assigned operation system login, the information of the current identification card of storage is sent to the Cloud Server.
  8. The antitheft tracing method of terminal according to any one of claim 1 to 6, it is characterised in that also include:
    Before the data service of the terminal is automatically turned on, judge the terminal whether still in open state;
    When judged result is that the terminal is not in the open state, the terminal is automatically turned on.
  9. A kind of anti-theft tracking device of terminal, the terminal includes multiple operating systems, it is characterised in that including:
    Processing unit, in the starting up of terminal or when having detected identification card insertion in the terminal, assigned operation system is selected from the multiple operating system to read the information of current identification card, and judges whether the identification card in the terminal is replaced according to the information of the current identification card;
    Authentication unit, when judged result is that the identification card is replaced, controls the assigned operation system to carry out subscriber authentication to the user of the terminal;
    Acquiring unit, when subscriber authentication fails, controls the assigned operation system to obtain the communication information of other operating systems in the positional information and the multiple operating system of the terminal;
    Interactive unit, controls the assigned operation system to automatically turn on the data service of the terminal, and attempts to send the positional information and the communication information to Cloud Server.
  10. The anti-theft tracking device of terminal according to claim 9, it is characterised in that the authentication unit specifically for:
    Gather finger print information, voiceprint, head image information and/or the cornea information of the user of the terminal, judge whether the finger print information, voiceprint, head image information and/or cornea information match with default finger print information, voiceprint, head image information and/or cornea information, when judged result is no, judge subscriber authentication failure, otherwise, it is determined that subscriber authentication success;Or
    The user of the terminal is pointed out to input the entrance key of the assigned operation system, and
    Do not received in preset time it is correct enter key, or the number of times of the entrance key input error is when exceeding preset times, subscriber authentication failure is judged, otherwise, it is determined that subscriber authentication success.
  11. The anti-theft tracking device of terminal according to claim 9, it is characterised in that the processing unit includes:
    Selecting unit, according to the level of security of the multiple operating system, operating system of the selection with level of security described in highest is used as the assigned operation system.
  12. The anti-theft tracking device of terminal according to claim 9, it is characterised in that the processing unit includes:
    Comparison unit, the assigned operation system reads the information of current identification card, and will be described The information of at least one identification card of the information of current identification card with storing is contrasted;
    Judging unit, when comparing result differs for the information and the information of each identification card in the information of at least one identification card described in storage of the current identification card, is judged as that the identification card is replaced,
    When comparing result is identical with the information of any identification card in the information of at least one identification card described in storage for the information of the current identification card, it is judged as that the identification card is not replaced.
  13. The anti-theft tracking device of terminal according to claim 12, it is characterised in that also include:
    First memory cell, when being started shooting after the terminal inserts identification card first, controls the assigned operation system to read the information of current identification card, and store the information of the current identification card.
  14. The anti-theft tracking device of terminal according to claim 12, it is characterised in that also include:
    Second memory cell, in subscriber authentication success, the information to the current identification card is stored, otherwise, and the information to the current identification card is not stored.
  15. The anti-theft tracking device of terminal according to claim 13 or 14, it is characterised in that also include:
    Logging status judging unit, after the information of current identification card described in the terminal storage, judges whether the assigned operation system logs in the account of the Cloud Server;And
    The interactive unit is additionally operable to:
    When detecting the account of Cloud Server described in the assigned operation system login, the information of the current identification card of storage is sent to the Cloud Server.
  16. The anti-theft tracking device of terminal according to any one of claim 9 to 14, it is characterised in that also include:
    Condition adjudgement unit, before the data service of the terminal is automatically turned on, judges whether the terminal is in open state;
    Opening unit, when judged result is that the terminal is not in the open state, automatically turns on the terminal.
  17. A kind of terminal, it is characterised in that including:
    Multiple operating systems;And
    The anti-theft tracking device of terminal as any one of claim 9 to 16.
CN201480081585.2A 2014-08-28 2014-08-28 Terminal and its antitheft tracing method and anti-theft tracking device Pending CN106797535A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2014/085461 WO2016029413A1 (en) 2014-08-28 2014-08-28 Terminal, and anti-theft tracking method and apparatus therefor

Publications (1)

Publication Number Publication Date
CN106797535A true CN106797535A (en) 2017-05-31

Family

ID=55398625

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201480081585.2A Pending CN106797535A (en) 2014-08-28 2014-08-28 Terminal and its antitheft tracing method and anti-theft tracking device

Country Status (2)

Country Link
CN (1) CN106797535A (en)
WO (1) WO2016029413A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112261099A (en) * 2020-10-15 2021-01-22 腾讯科技(深圳)有限公司 Position information acquisition method and device and electronic equipment
CN115714809A (en) * 2021-08-19 2023-02-24 深圳市万普拉斯科技有限公司 Mobile terminal tracking method, mobile terminal and readable storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101198119A (en) * 2006-12-09 2008-06-11 北京三星通信技术研究有限公司 Automatic loss reporting method and portable terminal using the same
CN101340638A (en) * 2008-08-12 2009-01-07 青岛海信移动通信技术股份有限公司 Alarm control method of mobile communication apparatus and mobile communication apparatus
CN102932741A (en) * 2012-11-20 2013-02-13 青岛海信移动通信技术股份有限公司 Mobile phone antitheft tracking method and antitheft tracking mobile phone
CN103079203A (en) * 2013-02-05 2013-05-01 北京握奇数据系统有限公司 Terminal authentication method and smart card
CN103369456A (en) * 2012-03-29 2013-10-23 英华达(上海)科技有限公司 Mobile phone antitheft system and method thereof
CN103607697A (en) * 2013-11-27 2014-02-26 宇龙计算机通信科技(深圳)有限公司 Terminal anti-theft method and system based on SIM card
CN103780754A (en) * 2013-12-31 2014-05-07 闻泰通讯股份有限公司 Anti-theft tracking system for mobile phone and method thereof

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4265430B2 (en) * 2004-02-09 2009-05-20 日本電気株式会社 Mobile terminal device
CN102790819A (en) * 2011-05-17 2012-11-21 芯讯通无线科技(上海)有限公司 Mobile terminal capable of protecting privacy and method
CN103338295A (en) * 2013-05-27 2013-10-02 苏州奇可思信息科技有限公司 Mobile phone anti-theft security system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101198119A (en) * 2006-12-09 2008-06-11 北京三星通信技术研究有限公司 Automatic loss reporting method and portable terminal using the same
CN101340638A (en) * 2008-08-12 2009-01-07 青岛海信移动通信技术股份有限公司 Alarm control method of mobile communication apparatus and mobile communication apparatus
CN103369456A (en) * 2012-03-29 2013-10-23 英华达(上海)科技有限公司 Mobile phone antitheft system and method thereof
CN102932741A (en) * 2012-11-20 2013-02-13 青岛海信移动通信技术股份有限公司 Mobile phone antitheft tracking method and antitheft tracking mobile phone
CN103079203A (en) * 2013-02-05 2013-05-01 北京握奇数据系统有限公司 Terminal authentication method and smart card
CN103607697A (en) * 2013-11-27 2014-02-26 宇龙计算机通信科技(深圳)有限公司 Terminal anti-theft method and system based on SIM card
CN103780754A (en) * 2013-12-31 2014-05-07 闻泰通讯股份有限公司 Anti-theft tracking system for mobile phone and method thereof

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112261099A (en) * 2020-10-15 2021-01-22 腾讯科技(深圳)有限公司 Position information acquisition method and device and electronic equipment
CN112261099B (en) * 2020-10-15 2021-08-31 腾讯科技(深圳)有限公司 Position information acquisition method and device and electronic equipment
CN115714809A (en) * 2021-08-19 2023-02-24 深圳市万普拉斯科技有限公司 Mobile terminal tracking method, mobile terminal and readable storage medium

Also Published As

Publication number Publication date
WO2016029413A1 (en) 2016-03-03

Similar Documents

Publication Publication Date Title
CN110851809B (en) Fingerprint identification method and device and touch screen terminal
CN104537291A (en) Screen interface unlocking method and screen interface unlocking device
CN108076426A (en) Terminal tracing method, apparatus, storage medium and terminal device
CN102946481A (en) Method and system for unlocking human face expression
US20150049922A1 (en) Method for logging a user in to a mobile device
CN105227316A (en) Based on mobile Internet account login system and the method for facial image authentication
CN101494690A (en) Mobile terminal and unlocking method thereof
CN105530356A (en) Mobile communication terminal and data protection method and device thereof
EP1486851A4 (en) Authentication system, authentication server, authentication method, authentication program, terminal, authentication request method, authentication request program, and storage medium
CN104156648A (en) Screen unlocking method and device
US20180039767A1 (en) Voiceprint-recognition-based security protection method and device
CN107437016B (en) Application control method and related product
CN103824030A (en) Data protection device and data protection method
CN110049490B (en) Safety protection method and device for wearable equipment, wearable equipment and medium
CN105809005A (en) Method for locking or unlocking computer screen based on fingerprints
CN108038363A (en) Improve the method and device of Terminal security
CN107590404A (en) Method for tracing and system and terminal device
CN109815669A (en) Authentication method and server based on recognition of face
TW200633466A (en) Network access system, method and recording medium
CN103927799A (en) Locking system based on biometric authentication, and locking method
CN108347730B (en) Wireless communication processing method and device
CN101827154A (en) Password setting and verification method in mobile terminal and device
CN110145187A (en) Control method for electronic lock, device, intelligent luggage and readable storage medium storing program for executing
CN108334761A (en) A kind of recognition methods of user right and device
CN106529232A (en) Startup method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170531