CN106815597A - A kind of terminal device method for tracing, terminal device and service equipment - Google Patents

A kind of terminal device method for tracing, terminal device and service equipment Download PDF

Info

Publication number
CN106815597A
CN106815597A CN201611147211.3A CN201611147211A CN106815597A CN 106815597 A CN106815597 A CN 106815597A CN 201611147211 A CN201611147211 A CN 201611147211A CN 106815597 A CN106815597 A CN 106815597A
Authority
CN
China
Prior art keywords
terminal device
information
service equipment
stolen
biological information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201611147211.3A
Other languages
Chinese (zh)
Inventor
陈俊彪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Jinli Communication Equipment Co Ltd
Original Assignee
Shenzhen Jinli Communication Equipment Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Jinli Communication Equipment Co Ltd filed Critical Shenzhen Jinli Communication Equipment Co Ltd
Priority to CN201611147211.3A priority Critical patent/CN106815597A/en
Publication of CN106815597A publication Critical patent/CN106815597A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/22Matching criteria, e.g. proximity measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/88Detecting or preventing theft or loss

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Artificial Intelligence (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Evolutionary Biology (AREA)
  • Evolutionary Computation (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present embodiments relate to communication technical field, a kind of terminal device method for tracing, terminal device and service equipment are disclosed, the method includes:Terminal device receives the biological information that service equipment sends;The biological information is sent to the service equipment by stolen terminal device after the biological information is gathered;The biological information is compared and matched by the terminal device with biological information storehouse, it is determined that the identity information with the biometric information matches.Implement the embodiment of the present invention, can determine the biological information of the user for taking terminal device away, and the probability for giving terminal device for change can be improved.

Description

A kind of terminal device method for tracing, terminal device and service equipment
Technical field
Set the present invention relates to communication technical field, more particularly to a kind of terminal device method for tracing, terminal device and service It is standby.
Background technology
With internet and the high speed development of the communication technology, the use of terminal device is increasingly popularized, while user also gets over Enter the operation such as storage of row information come more dependence terminal devices.
In real life, the quantity of the stolen terminal device picked up is more and more within average one day.Generally by terminal The positioning function of equipment searches the position of the terminal device of loss, or prevents other users from stealing end by lock function Important information in end equipment terminal;For example, after the mobile phone of user is lost, in order to recover the mobile phone lost in user, user Positioning function would generally be used, search the position of mobile phone, so as to fetch the mobile phone of loss.
However, by aforesaid operations mode, it is generally difficult to give the terminal device of loss for change, and it is generally difficult to determine actually It is who removes the terminal device of user.
The content of the invention
The embodiment of the invention discloses a kind of terminal device method for tracing, terminal device and service equipment, can determine and take The biological information of the user of terminal device is walked, and the probability for giving terminal device for change can be improved.
Embodiment of the present invention first aspect discloses a kind of terminal device method for tracing, including:
Terminal device receives the biological information that service equipment sends;The biological information is by stolen terminal device The service equipment is sent to after the biological information is gathered;
The biological information is compared and matched by the terminal device with biological information storehouse, it is determined that with it is described The identity information of biometric information matches.
Embodiment of the present invention second aspect discloses another terminal device method for tracing, including:
Stolen terminal device receives the antitheft instruction that service equipment sends, described antitheft to instruct for indicating the stolen end End equipment opens collecting biological feature information function;
After the stolen terminal device receives the antitheft instruction, the biological information of user is gathered;
The biological information is sent to the service equipment.
The embodiment of the present invention third aspect discloses another terminal device method for tracing, including:
Service equipment receives the activation instruction of user input, and the activation instruction is used to indicate the stolen terminal device of activation Anti-theft feature;
Antitheft instruction is sent to the stolen terminal device, it is described antitheft to instruct for indicating the stolen terminal device to open Open collecting biological feature information function;
Receive the biological information that the stolen terminal device sends;
The biological information is sent to terminal device.
Embodiment of the present invention fourth aspect discloses a kind of terminal device, including:
First receiving unit, the biological information for receiving service equipment transmission;The biological information is by losing Surreptitiously terminal device is sent to the service equipment after the biological information is gathered;
Matching unit is compared, is matched for the biological information to be compared with biological information storehouse;
Determining unit, for determining the identity information with the biometric information matches.
The aspect of the embodiment of the present invention the 5th discloses another terminal device, including:
Receiving unit, the antitheft instruction for receiving service equipment transmission is described antitheft to instruct for indicating stolen terminal Opening of device collecting biological feature information function;
Collecting unit, the biological characteristic letter for after the receiving unit receives the antitheft instruction, gathering user Breath;
Transmitting element, for the biological information to be sent into the service equipment.
The aspect of the embodiment of the present invention the 6th discloses a kind of service equipment, including:
First receiving unit, the activation instruction for receiving user input, the activation instruction is used to indicate activation stolen The anti-theft feature of terminal device;
First transmitting element, it is described antitheft to instruct for indicating for sending antitheft instruction to the stolen terminal device The stolen terminal device opens collecting biological feature information function;
Second receiving unit, for receiving the biological information that the stolen terminal device sends;
Second transmitting element, for the biological information to be sent into terminal device.
In the embodiment of the present invention, terminal device receives the biological information that service equipment sends, by by biological characteristic Information is compared with biological information storehouse and is matched, it is possible to it is determined that the identity information with biometric information matches.It can be seen that, Implement the embodiment of the present invention, by receiving the biological information that service equipment sends, can effectively determine that taking terminal away sets The biological information of standby user, is on the other hand matched by comparing with biological information storehouse, can effectively be determined With the identity information of biometric information matches.
Brief description of the drawings
Technical scheme in order to illustrate more clearly the embodiments of the present invention, below by to be used needed for embodiment Accompanying drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the present invention, for ability For the those of ordinary skill of domain, on the premise of not paying creative work, can also obtain other attached according to these accompanying drawings Figure.
Fig. 1 is a kind of schematic flow sheet of terminal device method for tracing disclosed in the embodiment of the present invention;
Fig. 2 is the schematic flow sheet of another terminal device method for tracing disclosed in the embodiment of the present invention;
Fig. 3 is the schematic flow sheet of another terminal device method for tracing disclosed in the embodiment of the present invention;
Fig. 4 is the schematic flow sheet of another terminal device method for tracing disclosed in the embodiment of the present invention;
Fig. 5 is a kind of concrete scene figure of terminal device method for tracing disclosed in the embodiment of the present invention;
Fig. 6 is a kind of structural representation of terminal device disclosed in the embodiment of the present invention;
Fig. 7 is the structural representation of another terminal device disclosed in the embodiment of the present invention;
Fig. 8 is the structural representation of another terminal device disclosed in the embodiment of the present invention;
Fig. 9 is the structural representation of another terminal device disclosed in the embodiment of the present invention;
Figure 10 is a kind of structural representation of service equipment disclosed in the embodiment of the present invention;
Figure 11 is the structural representation of another service equipment disclosed in the embodiment of the present invention;
Figure 12 is a kind of structural representation of terminal device tracing system disclosed in the embodiment of the present invention.
Specific embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation is described, it is clear that described embodiment is only a part of embodiment of the invention, rather than whole embodiments.Based on this Embodiment in invention, the every other reality that those of ordinary skill in the art are obtained under the premise of creative work is not made Example is applied, the scope of protection of the invention is belonged to.
Term " first ", " second " in description and claims of this specification and above-mentioned accompanying drawing etc. are for distinguishing Different object, rather than for describing particular order.Additionally, term " comprising " and " having " and their any deformations, meaning Figure is to cover non-exclusive including.For example contain process, method, system, product or the equipment of series of steps or unit The step of having listed or unit are not limited to, but alternatively also include the step of not listing or unit, or alternatively also Including for these processes, method or other intrinsic steps of equipment or unit.
The embodiment of the invention discloses a kind of terminal device method for tracing, terminal device and service equipment, can determine and take The biological information of the user of terminal device is walked, and the probability for giving terminal device for change can be improved.Carry out individually below in detail Describe in detail bright.
Fig. 1 is referred to, Fig. 1 is a kind of schematic flow sheet of terminal device method for tracing disclosed in the embodiment of the present invention.Such as Shown in Fig. 1, the terminal device method for tracing may comprise steps of:
101st, terminal device receives the biological information that service equipment sends.
In the embodiment of the present invention, terminal device can include cell phone, panel computer, personal digital assistant (Personal Digital Assistant, PDA), mobile internet device (Mobile Internet Device, MID) etc. Various terminal equipment, the embodiment of the present invention is not construed as limiting.
It is understood that above-mentioned terminal device can be any political affairs of public security bureau, police office or supervisor's public security work Terminal device used by the department of mansion.
In the embodiment of the present invention, biological information is sent to clothes by stolen terminal device after biological information is gathered Business equipment.
In the embodiment of the present invention, biological information can include:Finger print information, voiceprint, iris information, face picture letter At least one in breath and retinal information etc., the embodiment of the present invention is not construed as limiting.
As a kind of optional implementation method, the biological characteristic letter that service equipment sends is received in step 101 terminal device Before breath, the method described by Fig. 1 can also be comprised the following steps:
11) terminal device receives the identification information of the stolen terminal device that service equipment sends;
Wherein, step 101 is specifically as follows:
12) terminal device receives service equipment and sends after confirming that the terminal device corresponding to identification information is stolen Biological information.
In the implementation method, identity of the terminal device by receiving the stolen terminal device that service equipment sends is believed Breath, you can put on record to stolen terminal device;It is understood that in the implementation method, identification information can be mistake The surreptitiously IMIE (International Mobile Equipment Identity, International Mobile Equipment Identity code) of terminal device Information, it is also possible to which including service equipment identification information etc., the implementation method is not construed as limiting.
102nd, biological information is compared and matched by terminal device with biological information storehouse, it is determined that and biological characteristic The identity information of information matches.
In the embodiment of the present invention, collection of the public security department to the biological information of user is provided with certain accumulation, i.e., All biological informations of user have been prestored in biological information storehouse.
Used as a kind of optional implementation method, the method described by Fig. 1 can also be comprised the following steps:
13) terminal device receives the identification information and geographical coordinate of the stolen terminal device that service equipment sends;
14) terminal device inquires about the case information of stolen terminal device according to identification information.
In the implementation method, by receiving the identification information of the stolen terminal device that service equipment sends, Ke Yicha The case information of stolen terminal device corresponding with the identification information is ask, so that offer is effective to be believed for public security department solves a case Breath;By receiving the geographical coordinate of stolen terminal device, the geographical position where can effectively determining stolen terminal device, so that The probability for giving stolen terminal device for change is effectively increased, the user of terminal device can also be taken away and is provided with for public security department arrests Beneficial information.
Used as a kind of optional implementation method, after step 102, the method described by Fig. 1 can also include following step Suddenly:
15) terminal device searches the corresponding case information of identity information;
If 16) terminal device finds at least two case information, at least two case information pair for finding are counted The geographical coordinate answered, determines the active regions of identity information.
In the implementation method, if terminal device finds the corresponding case information at least two of above-mentioned identity information, say Bright above-mentioned identity information steals the terminal device of user more than once;According to the corresponding geographical coordinate of at least two case information, The active regions of above-mentioned identity information are determined, so as to can not only effectively improve the probability for giving stolen terminal device for change, Er Qietong The active regions for counting are crossed, can also be solved a case offer advantageous information for public security department, and according to the work of above-mentioned identity information Case number of times, may further determine that its criminal character.
In a concrete scene, for example, after the hand-set from stolen of user, public security department handles a case the terminal for using Equipment receives the handset identification information that service equipment sends, and user goes to public security department to handle a case in person again, and provides the mark of mobile phone Information, terminal device is after the handset identification information that confirmed service equipment sends is consistent with the identification information that user provides, you can Put on record with to mobile phone, and licensed service equipment is connected to terminal device;The finger print information that service equipment sends is received, will be referred to Line information is compared with finger print information storehouse and is matched, it is determined that the identity information matched with finger print information, you can obtain taking mobile phone away User information;When service equipment sends handset identification information and geographical coordinate, terminal device can be according to mobile phone logo The case information of information inquiry mobile phone, and according to geographical coordinate, it is determined that taking the geographical position of the user of mobile phone away.
It can be seen that, implement the method described by Fig. 1, terminal device receives the biological information that service equipment sends, passes through Biological information is compared with biological information storehouse and is matched, so that it is determined that believing with the identity of biometric information matches Breath.It can be seen that, implement the embodiment of the present invention, the biological information of the user that can effectively determine to take terminal device away.
Fig. 2 is referred to, Fig. 2 is the schematic flow sheet of another terminal device method for tracing disclosed in the embodiment of the present invention. As shown in Fig. 2 the terminal device method for tracing may comprise steps of:
201st, stolen terminal device receives the antitheft instruction that service equipment sends.
It is antitheft to instruct for indicating stolen terminal device to open collecting biological feature information function in the embodiment of the present invention.
In the embodiment of the present invention, stolen terminal device can include cell phone, panel computer, personal digital assistant (Personal Digital Assistant, PDA), mobile internet device (Mobile Internet Device, MID), Intelligent worn device (such as intelligent watch, Intelligent bracelet) various terminal equipment, the embodiment of the present invention is not construed as limiting.Citing comes Say, the mobile phone that stolen terminal device can be used for user, or motion bracelet that user uses etc., the embodiment of the present invention It is not construed as limiting.
202nd, stolen terminal device gathers the biological information of user.
In the embodiment of the present invention, after the antitheft instruction that stolen terminal device receives service equipment transmission, you can collection The biological information of user;Biological information can be input into for user oneself, and then stolen terminal device is acquired, Can also stolen terminal device be voluntarily acquired, the embodiment of the present invention is not construed as limiting.
It is understood that the biological information of stolen terminal device collection user can receive antitheft instruction Afterwards, voluntarily it is acquired in the case of no authentication demand;Can also enter in the case where there is authentication demand Row collection;For example, if the user of lost mobile phone does not carry out mobile phone, unblock is set, then the user for taking mobile phone away is not having In the case of carrying out authentication, you can carry out the associative operation of mobile phone, at this moment, mobile phone just can be in the feelings without authentication Under condition, the collection of biological information is voluntarily carried out;Again for example, stolen mobile phone can carry out many in the user for taking mobile phone away After secondary authentification failure, the collection of biological information is carried out;Can also gather biological when user's attempted authentication of mobile phone is taken away Characteristic information, the embodiment of the present invention is not construed as limiting.
203rd, biological information is sent to service equipment by stolen terminal device.
As a kind of optional implementation method, after step 202, and before step 203, the method described by Fig. 2 Can also comprise the following steps:
21) whether detection biological information matches with default biological information;
Wherein, step 203 is specifically as follows:
22) if biological information is mismatched with default biological information, biological information is sent to service Equipment.
In the implementation method, default biological information be stolen terminal device prestore its belonging to user institute There is biological information, can be the finger print information of stolen terminal device owning user, or iris information etc., the present invention Embodiment is not construed as limiting.
It can be seen that, implement the method described by Fig. 2, stolen terminal device is receiving the antitheft instruction of service equipment transmission Afterwards, the biological information of user is gathered, so as to biological information is sent into service equipment so that service equipment can be by The biological information of stolen terminal device collection is sent to the terminal device of public security department.It can be seen that, implement the embodiment of the present invention, The biological information of the user that can effectively determine to take stolen terminal device away, so that for public security department solves a case offer effectively letter Breath.
Fig. 3 is referred to, Fig. 3 is the structural representation of another terminal device method for tracing disclosed in the embodiment of the present invention. As shown in figure 3, the terminal device method for tracing may comprise steps of:
301st, service equipment receives the activation instruction of user input.
In the embodiment of the present invention, activation instruction is used to indicate the anti-theft feature of the stolen terminal device of activation.
It is understood that service equipment is by receiving the activation instruction of user input, you can determine that the terminal of user sets It is standby stolen, so as to perform next step.
302nd, service equipment sends antitheft instruction to stolen terminal device.
It is antitheft to instruct for indicating stolen terminal device to open collecting biological feature information function in the embodiment of the present invention.
303rd, service equipment receives the biological information that stolen terminal device sends.
304th, biological information is sent to terminal device by service equipment.
Used as a kind of optional implementation method, before step 304, the method described by Fig. 3 can also include following step Suddenly:
31) service equipment sends the identification information of stolen terminal device to terminal device;
32) grant instruction that service equipment receiving terminal apparatus send.
In the implementation method, grant instruction is used to indicate service equipment to obtain the license being attached with terminal device.
It is understood that when service equipment receives the grant instruction of the terminal device transmission of public security department, you can really The license that service equipment has obtained connecting terminal device is determined, so that service equipment can notify that public security department sets with stolen terminal Standby related information.
Used as a kind of optional implementation method, the method described by Fig. 3 can also be comprised the following steps:
33) service equipment sends to terminal device includes the identification information of stolen terminal device and geographical coordinate Indicator.
In the implementation method, the case information of the indicator stolen terminal device of instruction terminal equipment query.
It is understood that the identification information of stolen terminal device to be sent to the terminal device of public security department, make The terminal device for obtaining public security department can be according to the corresponding stolen terminal device stored before identification information inquiry Related Cases information, so as to improve the search efficiency of terminal device;It is sent to by by the geographical coordinate of stolen terminal device Terminal device, can cause that terminal device searches the position of stolen terminal device according to the geographical coordinate, so as to improve give mistake for change The surreptitiously probability of terminal device.
It can be seen that, be sent to for the biological information that stolen terminal device is gathered by the method shown in implementing Fig. 3, service equipment Terminal device, so that terminal device can search the identity with the biometric information matches according to the biological information Information, the biological information of the user that can effectively determine to take stolen terminal device away.It can be seen that, implement the embodiment of the present invention, The biological information of the user that can effectively determine to take stolen terminal device away, so as to improve give the general of stolen terminal device for change Rate.
Fig. 4 is referred to, Fig. 4 is the schematic flow sheet of another terminal device method for tracing disclosed in the embodiment of the present invention. As shown in figure 4, the terminal device method for tracing is comprised the following steps:
401st, service equipment receives the activation instruction of user input.
In the embodiment of the present invention, activation instruction is used to indicate the anti-theft feature of the stolen terminal device of activation.
402nd, service equipment sends antitheft instruction to stolen terminal device, and stolen terminal device receives what service equipment sent Antitheft instruction.
It is antitheft to instruct for indicating stolen terminal device to open collecting biological feature information function in the embodiment of the present invention.
403rd, stolen terminal device gathers the biological information of user.
In the embodiment of the present invention, after the antitheft instruction that stolen terminal device receives service equipment transmission, you can collection The biological information of user;Biological information can be that user oneself input, or stolen terminal device is carried out Collection, the embodiment of the present invention is not construed as limiting.
It is understood that the biological information of stolen terminal device collection user can receive antitheft instruction Afterwards, voluntarily it is acquired in the case of no authentication demand;Can also enter in the case where there is authentication demand Row collection;For example, if the user of lost mobile phone does not carry out mobile phone, unblock is set, then the user for taking mobile phone away is not having In the case of carrying out authentication, you can carry out the associative operation of mobile phone, at this moment, mobile phone just can be in the feelings without authentication Under condition, the collection of biological information is voluntarily carried out;Again for example, stolen mobile phone can carry out many in the user for taking mobile phone away After secondary authentification failure, the collection of biological information is carried out, it is also possible to when user's attempted authentication of mobile phone is taken away, collection is biological Characteristic information, the embodiment of the present invention is not construed as limiting.
In the embodiment of the present invention, biological information can include:Finger print information, voiceprint, iris information, face picture letter At least one in breath and retinal information etc., the embodiment of the present invention is not construed as limiting.
404th, biological information is sent to service equipment by stolen terminal device, and service equipment receives stolen terminal device The biological information of transmission.
Used as a kind of optional implementation method, after step 403, and before step 404, the method described by Fig. 4 is also May comprise steps of:
41) whether stolen terminal device detection biological information matches with default biological information;If mismatching, Perform step 404.
405th, service equipment sends the identification information of stolen terminal device to terminal device, and terminal device receives service The identification information of the stolen terminal device that equipment sends.
In the embodiment of the present invention, identity of the terminal device by receiving the stolen terminal device that service equipment sends is believed Breath, you can put on record to stolen terminal device;It is understood that identification information can be stolen terminal device IMIE information, it is also possible to which including service equipment identification information etc., the embodiment of the present invention is not construed as limiting.
406th, the grant instruction that service equipment receiving terminal apparatus send.
In the embodiment of the present invention, grant instruction is used to indicate service equipment to obtain the license being attached with terminal device.
It is understood that step 405 can also be waited before step 403 with step 406, the embodiment of the present invention is not limited It is fixed.
407th, biological information is sent to terminal device by service equipment, and terminal device receives the life that service equipment sends Thing characteristic information.
It is understood that above-mentioned terminal device is any portion of government of public security bureau, police office or supervisor's public security work Door work terminal device used.
408th, terminal device confirm identification information corresponding to terminal device it is stolen after, by biological information with Biological information storehouse is compared matching, it is determined that the identity information with biometric information matches.
In the embodiment of the present invention, collection of the government department to the biological information of user is provided with certain accumulation, i.e., The biological information of user has been prestored in biological information storehouse.
409th, service equipment sends to terminal device includes the identification information and geographical coordinate of stolen terminal device Indicator, terminal device receive service equipment send stolen terminal device identification information and geographical coordinate.
In the embodiment of the present invention, the case information of the indicator stolen terminal device of instruction terminal equipment query.
410th, terminal device inquires about the case information of stolen terminal device according to identification information.
In the embodiment of the present invention, by receiving the identification information of the stolen terminal device that service equipment sends, can be with The case information of inquiry stolen terminal device corresponding with the identification information, so that offer is effective to be believed for public security department solves a case Breath;By receiving the geographical coordinate of stolen terminal device, the geographical position where can effectively determining stolen terminal device, so that Effectively increase the probability for giving stolen terminal device for change.
411st, terminal device searches the corresponding case information of identity information, if terminal device finds at least two cases letter Breath, then count the corresponding geographical coordinate of at least two case information for finding, and determines the active regions of identity information.
In the embodiment of the present invention, if terminal device finds the corresponding case information at least two of above-mentioned identity information, Illustrate that above-mentioned identity information steals the terminal device of user more than once;According to the corresponding geographical seat of at least two case information Mark, determines the active regions of above-mentioned identity information, so that the probability for giving stolen terminal device for change can be not only effectively improved, and By the active regions for counting, can also be solved a case offer advantageous information for public security department, and according to above-mentioned identity information Crime number of times, may further determine that its criminal character.
Apply in a specific scene, refer to Fig. 5, Fig. 5 is a kind of terminal device disclosed in the embodiment of the present invention The concrete scene figure of method for tracing.As shown in figure 5, the specific steps of the terminal device method for tracing can include:
501st, the service equipment of the stolen mobile phone of User logs in activates the anti-theft feature of its mobile phone;
When user activates the anti-theft feature of its mobile phone, you can mobile phone is locked, and open the fingerprint time of mobile phone Pass on Gong energy.
502nd, service equipment carry out it is pre- report a case to the security authorities, to public security department terminal device provide mobile phone identification information;
When service equipment carries out pre- reporting a case to the security authorities, the IMIE information of mobile phone can be provided, it is also possible to provide the mark of service equipment Knowledge information.
503rd, the identification information of mobile phone is supplied to user by service equipment;
504th, user is truly reported a case to the security authorities to public security department;
The identity of the mobile phone that the identification information of the mobile phone that public security department provides user is provided with service equipment Information is matched, if matching, service equipment can open notice public security department on taking being permitted for the finger print information of mobile phone away Can.
505th, when thief touches Fingerprint Identification Unit, mobile phone can gather the finger print information of thief;
506th, the finger print information that mobile phone will be collected is sent to service equipment;
507th, the finger print information is sent to service equipment the terminal device of public security department, and the terminal device of public security department is looked into The user that inquiry is matched with the finger print information, so that it is determined that the identity information of thief.
It can be seen that, implement the method described by Fig. 4 and Fig. 5, the biological information of user is gathered by stolen terminal device, Biological information is sent to terminal device by service equipment, and terminal device is by by biological information and biological information Storehouse is compared matching, can effectively determine the identity information with biometric information matches.It can be seen that, implement the present invention and implement Example, terminal device can effectively determine to take the use of terminal device away by receiving the biological information that service equipment sends The biological information at family;On the other hand matched by the way that biological information is compared with biological information storehouse, can be with The identity information with biometric information matches is effectively determined, so as to also provide beneficial clue for public security department solves a case.
Fig. 6 is referred to, Fig. 6 is a kind of structural representation of terminal device disclosed in the embodiment of the present invention, can be used for holding Terminal device method for tracing disclosed in the row embodiment of the present invention, as shown in fig. 6, the terminal device can include:
First receiving unit 601, the biological information for receiving service equipment transmission;
In the embodiment of the present invention, biological information is sent to clothes by stolen terminal device after biological information is gathered Business equipment.
Matching unit 602 is compared, is matched for biological information to be compared with biological information storehouse;
Determining unit 603, for determining the identity information with biometric information matches.
Used as a kind of optional implementation method, the terminal device shown in Fig. 6 can also include:
Second receiving unit, the identification information of the stolen terminal device for receiving service equipment transmission;
First receiving unit 601, specifically for determining the terminal device corresponding to identification information in determining unit 603 After stolen, the biological information that service equipment sends is received.
Used as a kind of optional implementation method, the second receiving unit is additionally operable to receive the stolen terminal that service equipment sends The identification information and geographical coordinate of equipment;
Terminal device shown in Fig. 6 can also include:Query unit, for inquiring about stolen terminal according to identification information The case information of equipment.
Used as a kind of optional implementation method, above-mentioned query unit is additionally operable to search the corresponding case information of identity information;
Terminal device shown in Fig. 6 also includes:Statistics determining unit, for finding at least two cases when query unit Information, the corresponding geographical coordinate of at least two case information that statistics finds, and determine the active regions of identity information.
Fig. 7 is referred to, Fig. 7 is the structural representation of another terminal device disclosed in the embodiment of the present invention, be can be used for Terminal device method for tracing disclosed in the embodiment of the present invention is performed, as shown in fig. 7, the terminal device 700 can include:At least one Individual processor 701, at least one input unit 702, at least one output device 703, the grade component of memory 704.Wherein, these Component can be communicatively coupled by one or more bus 705.It will be understood by those skilled in the art that shown in Fig. 7 The structure of terminal device does not constitute the restriction to the embodiment of the present invention, and it both can be busbar network, or star-like Structure, can also include part more more or less than diagram, or combine some parts, or different part arrangements.Its In:
Processor 701 is the control centre of terminal device, using each of various interfaces and the whole terminal device of connection Individual part, by running or performing program and/or unit of the storage in memory 704, and calls storage in memory 704 Interior data, to perform the various functions and processing data of terminal device.Processor 701 can be by integrated circuit (Integrated Circuit, abbreviation IC) is constituted, for example, can be made up of the IC of single encapsulation, it is also possible to by many of connection The encapsulation IC of identical function or difference in functionality and constitute.For example, processor 701 can only include central processing unit (Central Processing Unit, abbreviation CPU), or CPU, digital signal processor (Digital Signal Processor, abbreviation DSP), graphic process unit (Graphic Processing Unit, abbreviation GPU) and various control chips Combination.In embodiments of the present invention, CPU can be single arithmetic core, it is also possible to including multioperation core.
Input unit 702 can be including the touch-screen of standard, keyboard etc., it is also possible to including wireline interface, wave point etc., Can be used for being interacted with user or service equipment.
Output device 703 can be including display screen, loudspeaker etc., it is also possible to including wireline interface, wave point etc., can be with It is attached with service equipment.
Memory 704 can be used to store software program and unit, processor 701, input unit 702 and output device 703 by calling storage software program and unit in memory 704, so as to perform the various functions application of terminal device And realize data processing.Memory 704 mainly includes program storage area and data storage area, wherein, program storage area can be deposited Application program needed for storage operating system, at least one function etc.;Data storage area can store the use institute according to terminal device Data of establishment etc..In embodiments of the present invention, operating system can be android system, iOS system or Windows operation System etc..
In the terminal device shown in Fig. 7, processor 701 calls storage application program in memory 704, for holding The following operation of row:
The biological information that service equipment sends is received by input unit 702;Biological information is by stolen terminal Equipment is sent to service equipment after biological information is gathered;
Biological information is compared with biological information storehouse and is matched, it is determined that the body with biometric information matches Part information.
In one embodiment, processor 701 by input unit 702 receive service equipment send biological information it Before, processor 701 may call upon storage application program in memory 704, and perform following operation:
The identification information of the stolen terminal device that service equipment sends is received by input unit 702;
After confirming that the terminal device corresponding to identification information is stolen, triggering input unit 702 receives service equipment The biological information of transmission.
In one embodiment, processor 701 may call upon storage application program in memory 704, and perform with Lower operation:
The identification information and geographical seat of the stolen terminal device that service equipment sends are received by input unit 702 Mark;
The case information of stolen terminal device is inquired about according to identification information.
In one embodiment, it is determined that after identity information with biometric information matches, processor 701 can also be adjusted With storage application program in memory 704, and the following operation of execution:
Search the corresponding case information of identity information;
If finding at least two case information, the corresponding geographical seat of at least two case information for finding is counted Mark, determines the active regions of identity information.
It can be seen that, implement the terminal device shown in Fig. 6 and Fig. 7, by receiving the biological information that service equipment sends, will Biological information is compared with biological information storehouse and is matched, so that it is determined that believing with the identity of biometric information matches Breath.It can be seen that, implement the embodiment of the present invention, the biological information of the user that can effectively determine to take terminal device away.
Fig. 8 is referred to, Fig. 8 is the structural representation of another terminal device disclosed in the embodiment of the present invention, for performing Terminal device method for tracing disclosed in the embodiment of the present invention, as shown in figure 8, the terminal device can include:
Receiving unit 801, the antitheft instruction for receiving service equipment transmission;
It is antitheft to instruct for indicating stolen terminal device to open collecting biological feature information function.
Collecting unit 802, for after receiving unit 801 receives antitheft instruction, gathering the biological information of user;
Transmitting element 803, for biological information to be sent into service equipment.
Used as a kind of optional implementation method, the terminal device shown in Fig. 8 can also include:
Detection unit, for detecting whether biological information matches with default biological information;
Transmitting element 803, if specifically for detection unit detection biological information and default biological information not Match somebody with somebody, then biological information is sent to service equipment.
Refer to Fig. 9, Fig. 9 be the present invention be another terminal device disclosed in embodiment structural representation, such as Fig. 9 institutes Show, the terminal device 900 can include:At least one processor 901, at least one input unit 902, at least one output dress Put 903, the grade component of memory 904.Wherein, these components can be communicatively coupled by one or more bus 905.Ability Field technique personnel are appreciated that the structure of the terminal device shown in Fig. 9 does not constitute the restriction to the embodiment of the present invention, and it was both Can be busbar network, or hub-and-spoke configuration, part more more or less than diagram can also be included, or combine certain A little parts, or different part arrangements.Wherein:
Processor 901 is the control centre of terminal device, using each of various interfaces and the whole terminal device of connection Individual part, by running or performing program and/or unit of the storage in memory 904, and calls storage in memory 904 Interior data, to perform the various functions and processing data of terminal device.Processor 901 can be made up of IC, example As that can be made up of the IC of single encapsulation, it is also possible to constituted by connecting the encapsulation IC of many identical functions or difference in functionality. For example, processor 901 can only include central processor CPU, or CPU, digital signal processor DSP, figure The combination of processor GPU and various control chips.In embodiments of the present invention, CPU can be single arithmetic core, it is also possible to wrap Include multioperation core.
Input unit 902 can be including the touch-screen of standard, keyboard etc., it is also possible to including wireline interface, wave point etc., Can be used for being interacted with user or service equipment.
Output device 903 can be including display screen, loudspeaker etc., it is also possible to including wireline interface, wave point etc., can be with For being communicated with service equipment.
Memory 904 can be used to store software program and unit, processor 901, input unit 902 and output device 903 by calling software program and unit of the storage in memory 904, so as to perform the various functions application of terminal device And realize data processing.Memory 904 mainly includes program storage area and data storage area, wherein, program storage area can be deposited Application program needed for storage operating system, at least one function etc.;Data storage area can store the use institute according to terminal device Data of establishment etc..In embodiments of the present invention, operating system can be android system, iOS system or Windows operation System etc..
In the terminal device shown in Fig. 9, processor 901 calls application program of the storage in memory 904, for holding The following operation of row:
Triggering input unit 902 receives the antitheft instruction that service equipment sends, and antitheft instruction is used to indicate stolen terminal to set It is standby to open collecting biological feature information function;
Gather the biological information of user;
Biological information is sent to service equipment by triggering output device 903.
In one embodiment, after the biological information of the collection user of processor 901, and triggering output device 903 Before biological information is sent into service equipment, processor 901 may call upon application journey of the storage in memory 904 Sequence, and perform following operation:
Whether detection biological information matches with default biological information, if mismatching, triggers output device 903 Biological information is sent to service equipment.
It can be seen that, implement the terminal device shown in Fig. 8 and Fig. 9, stolen terminal device is receiving the anti-of service equipment transmission After stealing instruction, the biological information of user is gathered, so as to biological information is sent into service equipment so that service equipment The biological information that stolen terminal device is gathered can be sent to the terminal device of public security department.It can be seen that, implement the present invention Embodiment, the biological information of the user that can effectively determine to take stolen terminal device away, so as to be carried for public security department solves a case For effective information.
Figure 10 is referred to, Figure 10 is a kind of structural representation of service equipment disclosed in the embodiment of the present invention.For performing Terminal device method for tracing disclosed in the embodiment of the present invention, as shown in Figure 10, the service equipment can include:
First receiving unit 1001, the activation instruction for receiving user input;
In the embodiment of the present invention, activation instruction is used to indicate the anti-theft feature of the stolen terminal device of activation.
First transmitting element 1002, for sending antitheft instruction to stolen terminal device;
It is antitheft to instruct for indicating stolen terminal device to open collecting biological feature information function in the embodiment of the present invention.
Second receiving unit 1003, for receiving the biological information that stolen terminal device sends;
Second transmitting element 1004, for biological information to be sent into terminal device.
Used as a kind of optional implementation method, the second transmitting element 1004 is additionally operable to send stolen terminal to terminal device The identification information of equipment;
Terminal device shown in Figure 10 can also include:3rd receiving unit, for the license that receiving terminal apparatus send Instruction.
In the embodiment of the present invention, grant instruction is used to indicate service equipment to obtain the license being attached with terminal device.
As a kind of optional implementation method, the second transmitting element 1004, be additionally operable to be sent to terminal device include it is stolen The identification information of terminal device and the indicator of geographical coordinate;Wherein, indicator instruction terminal equipment query loses The surreptitiously case information of terminal device.
Figure 11 is referred to, Figure 11 is another service equipment structural representation provided in an embodiment of the present invention, and the service sets Standby 1100 can include one or more central processing units because of configuration or performance is different and the larger difference of producing ratio (central processing units, CPU) 1122 (for example, one or more processors) and memory 1132, one Individual or more than one storage application program 1142 or data 1144 storage medium 1130 (for example deposit by one or more magnanimity Storage equipment).Wherein, memory 1132 and storage medium 1130 can be of short duration storage or persistently storage.Storage is in storage medium 1130 program can include one or more units (diagram is not marked), and each unit can include in service equipment Series of instructions operation.Further, central processing unit 1122 could be arranged to be communicated with storage medium 1130, in service The series of instructions operation in storage medium 1130 is performed in equipment 1100.
Service equipment 1100 can also include one or more power supplys 1126, and one or more are wired or wireless Network interface 1150, one or more input/output interfaces 1158, and/or, one or more operating systems 1141, Such as Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM etc..
Step in above-described embodiment as performed by service equipment can be based on the service equipment structure shown in the Figure 11.
It can be seen that, implement the service equipment shown in Figure 10 and Figure 11, the biology that service equipment gathers stolen terminal device is special Reference breath is sent to terminal device, so that terminal device can be searched and biological characteristic letter according to the biological information The identity information of matching is ceased, the biological information of the user that can effectively determine to take stolen terminal device away.It can be seen that, implement this Inventive embodiments, the biological information of the user that can effectively determine to take stolen terminal device away so that improve give for change it is stolen The probability of terminal device.
Figure 12 is referred to, Figure 12 is a kind of structural representation of terminal device tracing system disclosed in the embodiment of the present invention. As shown in figure 12, the terminal device tracing system can set including stolen terminal device 1201, service equipment 1202 and terminal Standby 1203.Wherein, terminal device of the terminal device 1203 used by public security department or other public security works;Stolen terminal device 1201 can be arbitrary terminal device, can be the mobile phone of user, or wearable device of user etc., the present invention Embodiment is not construed as limiting.The concrete function of stolen terminal device 1201, service equipment 1202 and terminal device 1103 can join The content described in foregoing embodiments is examined, be will not be described in great detail here.The biology for gathering user by stolen terminal device is special Reference is ceased, and biological information is sent to terminal device by service equipment, terminal device by by biological information with it is biological Characteristic information storehouse is compared matching, can effectively determine the identity information with biometric information matches.It can be seen that, implement this hair Bright embodiment, terminal device can effectively determine that taking terminal away sets by receiving the biological information that service equipment sends The biological information of standby user;On the other hand compare by by biological information and biological information storehouse Match somebody with somebody, can effectively determine the identity information with biometric information matches, so as to also provide beneficial clue for public security department solves a case.
Module or unit in all embodiments of the invention, by universal integrated circuit, such as CPU, or can pass through ASIC (Application Specific Integrated Circuit, application specific integrated circuit) is realized.
It should be noted that for each foregoing embodiment of the method, in order to be briefly described, therefore it is all expressed as one it is The combination of actions of row, but those skilled in the art should know, and the present invention is not limited by described sequence of movement, because It is that, according to the present invention, certain some step can sequentially or simultaneously be carried out using other.Secondly, those skilled in the art also should Know, embodiment described in this description belongs to preferred embodiment, involved action and unit not necessarily this hair Necessary to bright.
One of ordinary skill in the art will appreciate that all or part of flow in realizing above-described embodiment method, can be The hardware of correlation is instructed to complete by computer program, described program can be stored in a computer read/write memory medium In, the program is upon execution, it may include such as the flow of the embodiment of above-mentioned each method.Wherein, described storage medium can be magnetic Dish, CD, read-only memory (Read-Only Memory, ROM) or random access memory (Random Access Memory, abbreviation RAM) etc..
Unit in embodiment of the present invention terminal device and service equipment can merge according to actual needs, divide and Delete.
A kind of terminal device method for tracing, terminal device and service equipment disclosed in the embodiment of the present invention are carried out above It is discussed in detail, specific case used herein is set forth to principle of the invention and implementation method, above example Illustrate that being only intended to help understands the method for the present invention and its core concept;Simultaneously for those of ordinary skill in the art, according to According to thought of the invention, will change in specific embodiments and applications, in sum, this specification content Should not be construed as limiting the invention.

Claims (18)

1. a kind of terminal device method for tracing, it is characterised in that including:
Terminal device receives the biological information that service equipment sends;The biological information is being adopted by stolen terminal device The service equipment is sent to after collecting the biological information;
The biological information is compared and matched by the terminal device with biological information storehouse, it is determined that with the biology The identity information of characteristic information matching.
2. method according to claim 1, it is characterised in that it is special that the terminal device receives the biology that service equipment sends Before reference breath, methods described also includes:
The terminal device receives the identification information of the described stolen terminal device that the service equipment sends;
The terminal device is performed described in the reception after confirming that the terminal device corresponding to the identification information is stolen The biological information that service equipment sends.
3. method according to claim 1, it is characterised in that methods described also includes:
The terminal device receives the identification information and geography of the described stolen terminal device that the service equipment sends Coordinate;
The terminal device inquires about the case information of the stolen terminal device according to the identification information.
4. method according to claim 3, it is characterised in that the identity of the determination and the biometric information matches After information, methods described also includes:
The terminal device searches the corresponding case information of the identity information;
If the terminal device finds at least two case information, at least two cases information pair for finding is counted The geographical coordinate answered, determines the active regions of the identity information.
5. a kind of terminal device method for tracing, it is characterised in that including:
Stolen terminal device receives the antitheft instruction that service equipment sends, described antitheft to instruct for indicating the stolen terminal to set It is standby to open collecting biological feature information function;
After the stolen terminal device receives the antitheft instruction, the biological information of user is gathered;
The biological information is sent to the service equipment.
6. method according to claim 5, it is characterised in that the biological characteristic letter of the stolen terminal device collection user After breath, and it is described the biological information is sent to service equipment before, methods described also includes:
The stolen terminal device detects whether the biological information matches with default biological information, if mismatching, Then perform and described the biological information is sent to service equipment.
7. a kind of terminal device method for tracing, it is characterised in that including:
Service equipment receives the activation instruction of user input, and the activation instruction is used to indicate the antitheft of the stolen terminal device of activation Function;
Antitheft instruction is sent to the stolen terminal device, the antitheft instruction is given birth to for indicating the stolen terminal device to open Thing characteristic information acquisition function;
Receive the biological information that the stolen terminal device sends;
The biological information is sent to terminal device.
8. method according to claim 7, it is characterised in that described that the biological information is sent to terminal device Before, methods described also includes:
The identification information of the stolen terminal device is sent to the terminal device;
Receive the grant instruction that the terminal device sends, the grant instruction be used to indicating the service equipment obtain with it is described The license that terminal device is attached.
9. method according to claim 7, it is characterised in that methods described also includes:
The service equipment sends to the terminal device includes the identification information and geography of the stolen terminal device The indicator of coordinate;The indicator indicates the terminal device to inquire about the case information of the stolen terminal device.
10. a kind of terminal device, it is characterised in that including:
First receiving unit, the biological information for receiving service equipment transmission;The biological information is by stolen end End equipment is sent to the service equipment after the biological information is gathered;
Matching unit is compared, is matched for the biological information to be compared with biological information storehouse;
Determining unit, for determining the identity information with the biometric information matches.
11. terminal devices according to claim 10, it is characterised in that the terminal device also includes:
Second receiving unit, the identification information for receiving the described stolen terminal device that the service equipment sends;
First receiving unit, specifically for determining that the terminal corresponding to the identification information sets in the determining unit After stolen, the biological information that the service equipment sends is received.
12. terminal devices according to claim 10, it is characterised in that
Second receiving unit, is additionally operable to receive the identity letter of the described stolen terminal device that the service equipment sends Breath and geographical coordinate;
The terminal device also includes:
Query unit, the case information for inquiring about the stolen terminal device according to the identification information.
13. terminal devices according to claim 12, it is characterised in that the query unit, are additionally operable to search the body The corresponding case information of part information;
The terminal device also includes:
Statistics determining unit, for finding at least two case information when the query unit, statistics find it is described extremely The corresponding geographical coordinate of few two case information, and determine the active regions of the identity information.
14. a kind of terminal devices, it is characterised in that the terminal device includes:
Receiving unit, the antitheft instruction for receiving service equipment transmission is described antitheft to instruct for indicating stolen terminal device Open collecting biological feature information function;
Collecting unit, for after the receiving unit receives the antitheft instruction, gathering the biological information of user;
Transmitting element, for the biological information to be sent into the service equipment.
15. terminal devices according to claim 14, it is characterised in that the terminal device also includes:
Detection unit, for detecting whether the biological information matches with default biological information;
The transmitting element, if detecting the biological information and default biological information specifically for the detection unit Mismatch, then the biological information is sent to the service equipment.
16. a kind of service equipments, it is characterised in that the service equipment includes:
First receiving unit, the activation instruction for receiving user input, the activation instruction is used to indicate the stolen terminal of activation The anti-theft feature of equipment;
First transmitting element, for sending antitheft instruction to the stolen terminal device, it is described it is antitheft instruct it is described for indicating Stolen terminal device opens collecting biological feature information function;
Second receiving unit, for receiving the biological information that the stolen terminal device sends;
Second transmitting element, for the biological information to be sent into terminal device.
17. service equipments according to claim 16, it is characterised in that second transmitting element, are additionally operable to described Terminal device sends the identification information of the stolen terminal device;
The service equipment also includes:
3rd receiving unit, for receiving the grant instruction that the terminal device sends, the grant instruction is described for indicating Service equipment obtains the license being attached with the terminal device.
18. service equipments according to claim 16, it is characterised in that second transmitting element, are additionally operable to described Terminal device sends includes the identification information of the stolen terminal device and the indicator of geographical coordinate;The instruction Instruction indicates the terminal device to inquire about the case information of the stolen terminal device.
CN201611147211.3A 2016-12-13 2016-12-13 A kind of terminal device method for tracing, terminal device and service equipment Withdrawn CN106815597A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611147211.3A CN106815597A (en) 2016-12-13 2016-12-13 A kind of terminal device method for tracing, terminal device and service equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611147211.3A CN106815597A (en) 2016-12-13 2016-12-13 A kind of terminal device method for tracing, terminal device and service equipment

Publications (1)

Publication Number Publication Date
CN106815597A true CN106815597A (en) 2017-06-09

Family

ID=59110761

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611147211.3A Withdrawn CN106815597A (en) 2016-12-13 2016-12-13 A kind of terminal device method for tracing, terminal device and service equipment

Country Status (1)

Country Link
CN (1) CN106815597A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107592408A (en) * 2017-08-22 2018-01-16 广东欧珀移动通信有限公司 Method for controlling mobile terminal and Related product
CN109448372A (en) * 2018-11-07 2019-03-08 南通大学 A kind of safety monitoring and alarm method of riding

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107592408A (en) * 2017-08-22 2018-01-16 广东欧珀移动通信有限公司 Method for controlling mobile terminal and Related product
CN107592408B (en) * 2017-08-22 2020-07-17 Oppo广东移动通信有限公司 Mobile terminal control method and related product
CN109448372A (en) * 2018-11-07 2019-03-08 南通大学 A kind of safety monitoring and alarm method of riding
CN109448372B (en) * 2018-11-07 2022-02-01 南通大学 Riding safety monitoring and alarming method

Similar Documents

Publication Publication Date Title
CN1972186B (en) A mobile identity authentication system and its authentication method
CN110163611A (en) A kind of personal identification method, device and relevant device
CN105659244A (en) Security system, apparatus and method using additional code
CN102004881A (en) Mobile terminal and switching device and method of working modes thereof
CN102467462A (en) Method for protecting data stored in device and corresponding device
CN108647961A (en) Digital cash wallet based on electrocardiosignal authentication
CN106610719A (en) Fast operation method, device and terminal equipment
JPH11511627A (en) Method and system for transferring information between two groups of people, i.e., a migratory person and a resident person
CN113778537B (en) System mode switching method and device
CN106815509A (en) A kind of multimedia file guard method, device and electronic equipment
CN109979047A (en) Multi net voting intelligent door lock control method, storage medium, controller and Fingerprint Lock
CN107590404A (en) Method for tracing and system and terminal device
CN106815597A (en) A kind of terminal device method for tracing, terminal device and service equipment
CN106570972A (en) Unlocking method, system, and device
CN106529236A (en) Unlocking method, apparatus and system
CN105433569B (en) A kind of anti-lost reminding method based on intelligent wallet, system and intelligent wallet
CN106066956A (en) A kind of user terminal screen unlocking method, device and user terminal
CN104754124A (en) Terminal anti-theft method, device and system
CN106982418A (en) A kind of anti-lost processing method of mobile terminal and mobile terminal
JP2696929B2 (en) Anti-theft system for wireless telephones
CN105303744B (en) The theft preventing method and burglary-resisting system of mobile device
CN106780872A (en) A kind of unlocking method and a device
CN106033524A (en) An information prompt method and an electronic apparatus
CN107094079A (en) A kind of method for opening termination function, device and equipment
CN207813243U (en) A kind of intelligent door lock system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20170609

WW01 Invention patent application withdrawn after publication