CN107590404A - Method for tracing and system and terminal device - Google Patents

Method for tracing and system and terminal device Download PDF

Info

Publication number
CN107590404A
CN107590404A CN201610534769.0A CN201610534769A CN107590404A CN 107590404 A CN107590404 A CN 107590404A CN 201610534769 A CN201610534769 A CN 201610534769A CN 107590404 A CN107590404 A CN 107590404A
Authority
CN
China
Prior art keywords
terminal device
snugly
information
user
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610534769.0A
Other languages
Chinese (zh)
Inventor
虞晨磊
黄铖斌
王锦华
匡华龙
姜钰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Telecom Corp Ltd
Original Assignee
China Telecom Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Telecom Corp Ltd filed Critical China Telecom Corp Ltd
Priority to CN201610534769.0A priority Critical patent/CN107590404A/en
Publication of CN107590404A publication Critical patent/CN107590404A/en
Pending legal-status Critical Current

Links

Landscapes

  • Lock And Its Accessories (AREA)
  • Telephone Function (AREA)

Abstract

The invention discloses a kind of method for tracing and system and terminal device, is related to mobile security field.Method for tracing therein includes:Terminal device snugly carries out authentication in response to default trigger condition to the user of currently used terminal device;Terminal device snugly gathers the information for following the trail of terminal device in the case of authentication is unsanctioned;Terminal device sends the information for being used to follow the trail of terminal device of collection, to follow the trail of terminal device.The present invention to the user of currently used terminal device by snugly carrying out authentication, and authentication not by when snugly gather the information for following the trail of terminal device and send, tracking can be completed in the case of stealer is unwitting, the vigilance of stealer is reduced, improves and loses the success rate that terminal device is recovered.

Description

Method for tracing and system and terminal device
Technical field
The present invention relates to mobile security field, more particularly to a kind of method for tracing and terminal device.
Background technology
Substantial amounts of personal information is typically include in the terminal devices such as mobile phone, tablet personal computer, therefore ensures terminal device Safety is most important.
At present, after terminal device is stolen, the operations such as stealer is often shut down within the very first time, transferred accounts.Existing In technology, it can use and the safety verification means such as Shut Down Password, secret number are set, so as to prevent the shutdown of stealer, transfer accounts Etc. sensitive operation.
However, the setting of safety verification means is likely to make to input the enhancing your vigilance property of stealer of password failure repeatedly, from And battery is pulled out, thoroughly to cut off terminal device and extraneous communication, more it is unfavorable for recovering stolen terminal device.
The content of the invention
A technical problem to be solved of the embodiment of the present invention is:Improve and lose the success rate that terminal device is recovered.
One side according to embodiments of the present invention, there is provided a kind of method for tracing, including:Terminal device is in response to default Trigger condition, authentication snugly is carried out to the user of currently used terminal device;Terminal device does not pass through in authentication In the case of, snugly gather the information for following the trail of terminal device;Terminal device is by collection for following the trail of terminal device Information is sent, to follow the trail of terminal device.
In one embodiment, terminal device is performed for covering up terminal device in the case of authentication is unsanctioned The camouflage of time of day is shown.
In one embodiment, perform camouflage property show including:Terminal device disguised power-off, or, camouflage is crashed.
In one embodiment, terminal device is in the case of authentication is unsanctioned, into energy-saving mode, close except Other application outside default application, default application therein include gathering and sending answering for the information for following the trail of terminal device With.
In one embodiment, default trigger condition includes:The default user operation that terminal device detects, or Person, the preset instructions that terminal device receives.
In one embodiment, default user's operation includes power-off operation, transfer operation, delivery operation and answered default At least one of start-up operation.
In one embodiment, terminal device snugly carries out authentication bag to the user of currently used terminal device Include:Terminal device snugly opens fingerprint identification function, snugly catches the finger print information of the user of currently used terminal device, Authentication is carried out to user according to the finger print information of seizure and the fingerprint information hiding to prestore, and/or, terminal device is hidden Camera is opened on ground, the facial information of the user of currently used terminal device is snugly caught using camera, according to seizure Facial information and the facial information to prestore snugly carry out authentication to user.
In one embodiment, terminal device is snugly gathered for following the trail of terminal using at least one of following methods The information of equipment:Terminal device snugly opens camera, and obtains the video and/or image of camera seizure, or, terminal Equipment snugly opens positioning function, and obtains the current positional information of terminal device, or, terminal device, which is snugly opened, to be referred to Line identification function, and snugly catch the finger print information of the user of currently used terminal device.
Second aspect according to embodiments of the present invention, there is provided a kind of terminal device, including:Hide authentication module, For in response to default trigger condition, snugly carrying out authentication to the user of currently used terminal device;Tracked information Acquisition module, in the case of authentication is unsanctioned, snugly gathering the information for following the trail of terminal device;Tracking letter Sending module is ceased, for the information for being used to follow the trail of terminal device of collection to be sent, to follow the trail of terminal device.
In one embodiment, terminal device also includes camouflage display module, in the unsanctioned situation of authentication Under, perform the camouflage for covering up terminal device time of day and show.
In one embodiment, pretending display module includes shutdown camouflage unit and/or deadlock camouflage unit;Shutdown camouflage Unit is used for disguised power-off;Deadlock camouflage unit is used to pretend to crash.
In one embodiment, terminal device also includes power-saving module, in the case of authentication is unsanctioned, entering Enter energy-saving mode, close the other application in addition to default application, default application therein includes collection and sent for chasing after The application of the information of track terminal device.
In one embodiment, default trigger condition includes:The default user operation that terminal device detects, or Person, the preset instructions that terminal device receives.
In one embodiment, default user's operation includes power-off operation, transfer operation, delivery operation and answered default At least one of start-up operation.
In one embodiment, hiding authentication module includes hiding fingerprint authentication unit and/or hiding face verification Unit;Hide fingerprint authentication unit to be used to snugly open fingerprint identification function, snugly catch currently used terminal device The finger print information of user, authentication is carried out to user according to the finger print information of seizure and the fingerprint information hiding to prestore;It is hidden Tibetan's face authentication unit is used to snugly open camera, and the user of currently used terminal device is snugly caught using camera Facial information, authentication is snugly carried out to user according to the facial information of seizure and the facial information that prestores.
In one embodiment, tracked information acquisition module is adopted including image acquisition units, station acquisition unit and fingerprint Collect at least one of unit;Image acquisition units be used for snugly open camera, and obtain camera seizure video and/ Or image;Station acquisition unit is used to snugly open positioning function, and obtains the current positional information of terminal device;Fingerprint is adopted Collection unit is used to snugly open fingerprint identification function, and snugly catches the fingerprint letter of the user of currently used terminal device Breath.
3rd aspect according to embodiments of the present invention, there is provided a kind of tracing system, including:Any one foregoing terminal is set Standby and tracking platform, tracking platform are used to receive the information for being used to follow the trail of the terminal device that the terminal device is sent, and The terminal device is tracked according to the information for being used to follow the trail of the terminal device.
The present invention is not led to by snugly carrying out authentication to the user of currently used terminal device in authentication The out-of-date information snugly gathered for following the trail of terminal device is simultaneously sent, and can be completed in the case of stealer is unwitting Tracking, the vigilance of stealer is reduced, improve and lose the success rate that terminal device is recovered.
By referring to the drawings to the present invention exemplary embodiment detailed description, further feature of the invention and its Advantage will be made apparent from.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing There is the required accompanying drawing used in technology description to be briefly described, it should be apparent that, drawings in the following description are only this Some embodiments of invention, for those of ordinary skill in the art, without having to pay creative labor, may be used also To obtain other accompanying drawings according to these accompanying drawings.
Fig. 1 is the flow chart of one embodiment of method for tracing of the present invention.
Fig. 2 is the flow chart of another embodiment of method for tracing of the present invention.
Fig. 3 is the structure chart of one embodiment of tracing system of the present invention.
Fig. 4 is the structure chart of one embodiment of terminal device of the present invention.
Fig. 5 is the structure chart of another embodiment of terminal device of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, rather than whole embodiments.Below Description only actually at least one exemplary embodiment is illustrative, is never used as to the present invention and its application or makes Any restrictions.Based on the embodiment in the present invention, those of ordinary skill in the art are not making creative work premise Lower obtained every other embodiment, belongs to the scope of protection of the invention.
Unless specifically stated otherwise, the part and positioned opposite, the digital table of step otherwise illustrated in these embodiments Do not limited the scope of the invention up to formula and numerical value.
Fig. 1 is the flow chart of one embodiment of method for tracing of the present invention.As shown in figure 1, the method for the embodiment includes:
Step S102, terminal device is in response to default trigger condition, snugly to the user of currently used terminal device Carry out authentication.
Wherein, default trigger condition can include following two.
The first default trigger condition is the default user operation that terminal device detects, this trigger condition is based on The sensitive operation of active user, such as can include:Power-off operation, transfer operation, delivery operation, the startup to default application are grasped Make etc..
At present, many stealers shut down first after terminal device is obtained, so that terminal device disconnects and other equipment Communication connection.Therefore, the authentication that can be hidden when carrying out power-off operation to active user.
The operation such as transfer accounts, pay is the operation closely related with the interests of user.Therefore may be terminal carrying out such During the operation that the owner of equipment causes damage, the authentication that is hidden to active user.
Further, it is also possible to as needed, the application that user more pays close attention to is pre-set, for example, short message, address list, Photo, chat application etc..When these default applications are activated, active user can be equally hidden with triggering terminal equipment Authentication.
Second of default trigger condition is the preset instructions that terminal device receives.For example, the owner of terminal or its Other people have perceived terminal device loss, then can send default refer to terminal device by following the trail of platform or other equipment Order, so as to start the hiding identification verification function of terminal device.
Authentication is snugly carried out to refer to carry out authentication in the case where active user does not discover.Traditional input The verification mode of password enables stealer clearly to know the authentication behavior currently carried out, stealer is enhanced your vigilance Property.And the hiding authentication mode that the present invention uses, such as the mode such as fingerprint recognition, recognition of face, stealer can be made It can not discover and currently carry out authentication operation, so as to reduce the vigilance of stealer.
Description snugly carries out the process of authentication by fingerprint recognition below.Terminal device is snugly opened first to be referred to Line identification function, the finger print information of the user of currently used terminal device is then snugly caught, believed further according to the fingerprint of seizure Cease and the fingerprint information hiding that prestores authentication is carried out to user.
Wherein, terminal device can set fingerprint capture function on conventional operated key, for example, closing key, volume key, Return key etc., the confirmation in fingerprint capture function, such as conventional application can also be set in the conventional position of screen, returned Position, confirmation position during shutdown on screen etc..As needed, fingerprint can also be set in the other positions of terminal device Capture function, repeat no more here.
Because user carries out clicking operation using finger to terminal device mostly, therefore fingerprint recognition can not examined in user The identity information of user is effectively caught in the case of feel.
Description snugly carries out the process of authentication by recognition of face below.Terminal device is snugly opened take the photograph first Picture head, the facial information of the user of currently used terminal device is then snugly caught using camera, further according to the face of seizure Portion's information and the facial information to prestore snugly carry out authentication to user.
User in normal use mobile phone, face can be naturally occurring in camera it is seizable within the scope of, therefore people Face identifies the identity information that user can be effectively caught in the case where user does not discover.
Step S104, terminal device are snugly gathered for following the trail of terminal device in the case of authentication is unsanctioned Information.
Wherein, authentication is by the way that the user for illustrating now using terminal equipment is most likely not owner, is thus started Snugly tracing process.First, the information for following the trail of terminal device is snugly gathered, such as can be adopted using following information Mode set.
A kind of information gathering mode is that terminal device can snugly open camera, and obtains regarding for camera seizure Frequently, the information such as image.When terminal device snugly opens camera, the screen of terminal device does not have any display, will not yet Open flash lamp.That is, user can not know that camera has turned on.By this acquisition mode, terminal device can obtain surrounding Environmental information, or even the facial information of stealer.
Another information gathering mode is that terminal device snugly opens positioning function, and it is current to obtain terminal device Positional information.Snugly open positioning function when, screen will not display terminal have been switched on positioning function.Adopted by this Mode set, terminal device can obtain current location in real time, be easy to positioning and tracking to terminal device.
Another information gathering mode is that terminal device snugly opens fingerprint identification function, and is snugly caught current The finger print information of the user of using terminal equipment.By this acquisition mode, the identity of stealer can be known.
Except above-mentioned acquisition mode, terminal device can also snugly be gathered acoustic information by microphone, pass through mobile phone Internal sensor snugly picking rate information etc., and gather the other information that can be used for following the trail of terminal device.
Above-mentioned each acquisition mode can choose a kind of use, can also choose a variety of uses.
In addition, terminal device in the case of authentication is unsanctioned, can also pass into energy-saving mode, close except default Other application outside, default application therein include collection and send the application of the information for following the trail of terminal device. So as to add the cruising time of terminal device, more be used for the letters for following the trail of terminal device so that terminal device can obtain Breath.
Step S106, terminal device sends the information for being used to follow the trail of terminal device of collection, to follow the trail of terminal Equipment.
For example, the information for being used to follow the trail of terminal device of collection can be sent to tracking platform or default by terminal device Other-end, so that pursuer could be aware that current state and environmental information of terminal device etc., set so as to follow the trail of terminal It is standby.
By snugly carrying out authentication to the user of currently used terminal device, and authentication not by when it is hidden Gather the information for following the trail of terminal device and send with hiding, tracking can be completed in the case of stealer is unwitting, The vigilance of stealer is reduced, improves and loses the success rate that terminal device is recovered.
In order to further prevent stealer from operating terminal device, the loss of the terminal device owner is reduced, in body Part checking not by when, terminal device can also carry out camouflage property show.As shown in Fig. 2 on the basis of embodiment illustrated in fig. 1 On, after step s 102, the method for the embodiment also includes:
Step S203, terminal device are performed for covering up the true shape of terminal device in the case of authentication is unsanctioned The camouflage of state is shown.
The step can perform before or after step S104, can also perform simultaneously.
Camouflage property show can include it is following two.
The first is that terminal device pretends it and enters down state.
Terminal device can be with disguised power-off, such as can close screen or display blank screen.Now, stealer will be considered that end End equipment has thoroughly disconnected the communication connection with other equipment, so as to further lose vigilance.
Terminal device can also pretend to crash, such as can show the image to prestore or the current screen image of interception. When terminal device shows flower screen, middle virus, lasting refreshing connection or display current operation transfixion, active user will be considered that It is cell phone system problem, and is difficult that to associate be due to authentication not by caused.
Second is that terminal device is directed to the operation display false result of user.
For example, disconnection network for active user, operation, the terminal device such as transfer accounts can not actually perform the operation, But display operates successful result, makes active user take for having operated success.
So as to, the above method can prevent the further operation of stealer, reduce the loss of the terminal device owner, and The communicable state of terminal device can be kept, is advantageous to improve the success rate of tracking.
The application examples of method for tracing of the present invention is described below.
The behavior shut down immediately after terminal device is stolen for stealer, the trigger condition for hiding tracking is set to off Machine operates.After the power-off operation of user is detected, terminal device snugly refers to the user of currently used terminal device Line is verified;Then, terminal device can close screen to confuse stealer, Yi Jike in the case of authentication is unsanctioned To close the other application in addition to default application, to increase the cruising time of terminal device, default application therein includes Gather and send the application of the information for following the trail of terminal device;Finally, terminal is snugly gathered for following the trail of terminal device Information, for example, the information such as image of collection position, face or environment, and the information for being used to follow the trail of terminal device of collection is sent out See off, to follow the trail of terminal device.
By using this method, stealer can take for terminal device and have been switched off, and terminal device can stolen In the case of person is unwitting, the information such as collection position, image, fingerprint, the success rate for recovering terminal device is substantially increased.
The tracing system of one embodiment of the invention is described below with reference to Fig. 3.
Fig. 3 is the structure chart of one embodiment of tracing system of the present invention.As shown in figure 3, the system of the embodiment includes: Terminal device 32 and tracking platform 34, tracking platform 34 are used to receive setting for following the trail of the terminal for the terminal device transmission Standby information, and the terminal device is tracked according to the information for being used to follow the trail of the terminal device..
The terminal device of one embodiment of the invention is described below with reference to Fig. 4.
Fig. 4 is the structure chart of one embodiment of terminal device of the present invention.As shown in figure 4, the terminal device of the embodiment 32 include:Authentication module 422 is hidden, in response to default trigger condition, snugly to currently used terminal device User carry out authentication;Tracked information acquisition module 424, in the case of authentication is unsanctioned, snugly adopting Collect the information for following the trail of terminal device;Tracked information sending module 426, for by collection be used for follow the trail of the letter of terminal device Breath is sent, to follow the trail of terminal device 32.
By snugly carrying out authentication to the user of currently used terminal device, and authentication not by when it is hidden Gather the information for following the trail of terminal device and send with hiding, tracking can be completed in the case of stealer is unwitting, The vigilance of stealer is reduced, improves and loses the success rate that terminal device is recovered.
Wherein, default trigger condition can include:The default user operation that terminal device detects, or, terminal The preset instructions that equipment receives.
Wherein, default user's operation includes power-off operation, transfer operation, delivery operation and the startup behaviour to default application At least one of make.
The terminal device of another embodiment of the present invention is described below with reference to Fig. 5.
Fig. 5 is the structure chart of another embodiment of terminal device of the present invention.As shown in figure 5, the terminal of the embodiment is set Standby 32 also include camouflage display module 528, are used to cover up terminal device 32 in the case of authentication is unsanctioned, performing The camouflage of time of day is shown.So as to which above-mentioned module can prevent the further operation of stealer, reduce terminal device and own The loss of person, and the communicable state of terminal device can be kept, be advantageous to improve the success rate of tracking.
Shutdown camouflage unit 5282 and/or deadlock camouflage unit 5284 can be included by pretending display module;Shutdown camouflage is single Member is used for disguised power-off;Deadlock camouflage unit is used to pretend to crash.
In addition, terminal device 32 can also include power-saving module 529, in the case of authentication is unsanctioned, closing The other application in addition to default application is closed, so that terminal device 32 enters energy-saving mode, default application therein includes adopting Collect and send the application of the information for following the trail of terminal device.So that the cruising time of terminal device is added, so that terminal is set It is standby to obtain more information for being used to follow the trail of terminal device.
Wherein, hiding authentication module 422 includes hiding fingerprint authentication unit 5222 and/or hiding face verification unit 5224;Hide fingerprint authentication unit 5222 to be used to snugly open fingerprint identification function, snugly catch currently used terminal and set The finger print information of standby 32 user, user's progress identity is tested according to the finger print information of seizure and the fingerprint information hiding to prestore Card;Hide face verification unit 5224 to be used to snugly open camera, currently used terminal is snugly caught using camera The facial information of the user of equipment 32, identity is snugly carried out to user according to the facial information of seizure and the facial information to prestore Checking.
Because user carries out clicking operation to terminal device using finger more, and when using mobile phone, face can nature Ground appear in camera it is seizable within the scope of, therefore fingerprint recognition and recognition of face can be in the case where user do not discover Effectively catch the identity information of user.
Wherein, tracked information acquisition module 424 is adopted including image acquisition units 5242, station acquisition unit 5244 and fingerprint Collect at least one of unit 5246.Image acquisition units 5242 are used to snugly open camera, and obtain camera seizure Video and/or image;Station acquisition unit 5244 is used to snugly open positioning function, and obtains the current position of terminal device Confidence ceases;Fingerprint collecting unit 5246 is used to snugly open fingerprint identification function, and snugly catches currently used terminal and set The finger print information of standby user.By using above-mentioned module, the information such as image, position, fingerprint can be obtained, is advantageous to recover and loses The terminal device of mistake.
The present invention is the flow with reference to method according to embodiments of the present invention, equipment (system) and computer program product Figure and/or block diagram describe.Being interpreted as can be by each in computer program instructions implementation process figure and/or block diagram Flow and/or the flow in square frame and flow chart and/or block diagram and/or the combination of square frame.These computer journeys can be provided Sequence instruction to all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing devices processor with Produce a machine so that produce and be used for by the instruction of computer or the computing device of other programmable data processing devices Realize the dress for the function of being specified in one flow of flow chart or multiple flows and/or one square frame of block diagram or multiple square frames Put.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that counted Series of operation steps is performed on calculation machine or other programmable devices to produce computer implemented processing, so as in computer or The instruction performed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram one The step of function of being specified in individual square frame or multiple square frames.
The foregoing is only presently preferred embodiments of the present invention, be not intended to limit the invention, it is all the present invention spirit and Within principle, any modification, equivalent substitution and improvements made etc., it should be included in the scope of the protection.

Claims (17)

  1. A kind of 1. method for tracing, it is characterised in that including:
    Terminal device is snugly tested user's progress identity of the currently used terminal device in response to default trigger condition Card;
    The terminal device snugly gathers the letter for following the trail of the terminal device in the case of authentication is unsanctioned Breath;
    The terminal device sends the information for being used to follow the trail of the terminal device of collection, is set to follow the trail of the terminal It is standby.
  2. 2. according to the method for claim 1, it is characterised in that the terminal device is in the unsanctioned situation of authentication Under, perform the camouflage for covering up the terminal device time of day and show.
  3. 3. according to the method for claim 2, it is characterised in that it is described perform camouflage property show including:
    The terminal device disguised power-off, or, camouflage is crashed.
  4. 4. according to the method for claim 1, it is characterised in that the terminal device is in the unsanctioned situation of authentication Under, into energy-saving mode, the other application in addition to default application is closed, default application therein includes collection and sent to use In the application for the information for following the trail of the terminal device.
  5. 5. according to the method for claim 1, it is characterised in that the default trigger condition includes:Terminal device detects The default user operation arrived, or, the preset instructions that terminal device receives.
  6. 6. according to the method for claim 5, it is characterised in that default user's operation includes power-off operation, transferred accounts At least one of operation, delivery operation and start-up operation to default application.
  7. 7. according to the method any one of claim 1-6, it is characterised in that the terminal device is snugly to currently making Carrying out authentication with the user of the terminal device includes:
    Terminal device snugly opens fingerprint identification function, snugly catches the fingerprint of the user of the currently used terminal device Information, authentication is carried out to user according to the finger print information of seizure and the fingerprint information hiding to prestore,
    And/or
    Terminal device snugly opens camera, snugly catches the user's of the currently used terminal device using camera Facial information, authentication is snugly carried out to user according to the facial information of seizure and the facial information to prestore.
  8. 8. according to the method any one of claim 1-6, it is characterised in that the terminal device is used in following methods At least one information snugly gathered for following the trail of the terminal device:
    Terminal device snugly opens camera, and obtains the video and/or image of camera seizure,
    Or
    Terminal device snugly opens positioning function, and obtains the current positional information of the terminal device,
    Or
    Terminal device snugly opens fingerprint identification function, and snugly catches the finger of the user of the currently used terminal device Line information.
  9. A kind of 9. terminal device, it is characterised in that including:
    Authentication module is hidden, in response to default trigger condition, snugly to the currently used terminal device User carries out authentication;
    Tracked information acquisition module, it is used to follow the trail of the terminal in the case of authentication is unsanctioned, snugly gathering The information of equipment;
    Tracked information sending module, for the information for being used to follow the trail of the terminal device of collection to be sent, to follow the trail of The terminal device.
  10. 10. terminal device according to claim 9, it is characterised in that also include camouflage display module, for being tested in identity Demonstrate,prove it is unsanctioned in the case of, perform the camouflage for covering up the terminal device time of day and show.
  11. 11. terminal device according to claim 10, it is characterised in that it is single that the camouflage display module includes shutdown camouflage Member and/or deadlock camouflage unit;
    The shutdown camouflage unit is used for disguised power-off;
    The deadlock camouflage unit is used to pretend to crash.
  12. 12. terminal device according to claim 10, it is characterised in that also including power-saving module, in authentication In the case of unsanctioned, the other application in addition to default application is closed, terminal device is entered energy-saving mode, it is therein pre- If application includes the application for gathering and sending the information for following the trail of the terminal device.
  13. 13. terminal device according to claim 9, it is characterised in that the default trigger condition includes:Terminal device The default user operation detected, or, the preset instructions that terminal device receives.
  14. 14. terminal device according to claim 13, it is characterised in that default user's operation includes shutdown behaviour At least one of work, transfer operation, delivery operation and start-up operation to default application.
  15. 15. according to the terminal device described in claim 9-14, it is characterised in that the hiding authentication module includes hiding Fingerprint authentication unit and/or hiding face verification unit;
    The hiding fingerprint authentication unit is used to snugly open fingerprint identification function, snugly catches the currently used terminal The finger print information of the user of equipment, identity is carried out to user according to the finger print information of seizure with the fingerprint information hiding that prestores and tested Card;
    The hiding face verification unit is used to snugly open camera, is snugly caught using camera currently used described The facial information of the user of terminal device, body is snugly carried out to user according to the facial information of seizure and the facial information to prestore Part checking.
  16. 16. according to the terminal device described in claim 9-14, it is characterised in that the tracked information acquisition module includes image At least one of collecting unit, station acquisition unit and fingerprint collecting unit;
    Described image collecting unit is used to snugly open camera, and obtains the video and/or image of camera seizure;
    The station acquisition unit is used to snugly open positioning function, and obtains the current positional information of the terminal device;
    The fingerprint collecting unit is used to snugly open fingerprint identification function, and snugly catches the currently used terminal and set The finger print information of standby user.
  17. A kind of 17. tracing system, it is characterised in that including:
    Terminal device any one of claim 9-16,
    With, platform is followed the trail of, the information for being used to follow the trail of the terminal device sent for receiving the terminal device, and according to institute State and the terminal device is tracked for following the trail of the information of the terminal device.
CN201610534769.0A 2016-07-08 2016-07-08 Method for tracing and system and terminal device Pending CN107590404A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610534769.0A CN107590404A (en) 2016-07-08 2016-07-08 Method for tracing and system and terminal device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610534769.0A CN107590404A (en) 2016-07-08 2016-07-08 Method for tracing and system and terminal device

Publications (1)

Publication Number Publication Date
CN107590404A true CN107590404A (en) 2018-01-16

Family

ID=61046546

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610534769.0A Pending CN107590404A (en) 2016-07-08 2016-07-08 Method for tracing and system and terminal device

Country Status (1)

Country Link
CN (1) CN107590404A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108537061A (en) * 2018-04-17 2018-09-14 辽宁工程技术大学 A kind of financial data security system
CN109886004A (en) * 2019-04-03 2019-06-14 山东超越数控电子股份有限公司 Using the method and device for the protection data in magnetic disk that a variety of authentication modes combine
CN110490038A (en) * 2019-05-30 2019-11-22 福建知鱼科技有限公司 A kind of intelligence screen figure acquisition system
CN110619241A (en) * 2019-09-19 2019-12-27 中国联合网络通信集团有限公司 Terminal protection method and device
CN112492587A (en) * 2020-11-26 2021-03-12 珠海格力电器股份有限公司 Personal information protection method and system
CN113312106A (en) * 2021-06-10 2021-08-27 浙江网商银行股份有限公司 Data processing method and device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104573645A (en) * 2014-12-30 2015-04-29 苏州福丰科技有限公司 Face identification method for anti-theft mobile phone
CN104899490A (en) * 2015-05-27 2015-09-09 广东欧珀移动通信有限公司 Terminal positioning method and user terminal
CN105450841A (en) * 2014-09-25 2016-03-30 小米科技有限责任公司 Method and device of terminal guard against theft

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105450841A (en) * 2014-09-25 2016-03-30 小米科技有限责任公司 Method and device of terminal guard against theft
CN104573645A (en) * 2014-12-30 2015-04-29 苏州福丰科技有限公司 Face identification method for anti-theft mobile phone
CN104899490A (en) * 2015-05-27 2015-09-09 广东欧珀移动通信有限公司 Terminal positioning method and user terminal

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108537061A (en) * 2018-04-17 2018-09-14 辽宁工程技术大学 A kind of financial data security system
CN109886004A (en) * 2019-04-03 2019-06-14 山东超越数控电子股份有限公司 Using the method and device for the protection data in magnetic disk that a variety of authentication modes combine
CN110490038A (en) * 2019-05-30 2019-11-22 福建知鱼科技有限公司 A kind of intelligence screen figure acquisition system
CN110619241A (en) * 2019-09-19 2019-12-27 中国联合网络通信集团有限公司 Terminal protection method and device
CN112492587A (en) * 2020-11-26 2021-03-12 珠海格力电器股份有限公司 Personal information protection method and system
CN112492587B (en) * 2020-11-26 2022-10-11 珠海格力电器股份有限公司 Personal information protection method and system
CN113312106A (en) * 2021-06-10 2021-08-27 浙江网商银行股份有限公司 Data processing method and device

Similar Documents

Publication Publication Date Title
CN107590404A (en) Method for tracing and system and terminal device
CN105279416B (en) Personal identification method and its system based on multi-biological characteristic bonding apparatus fingerprint
CN106557678B (en) A kind of intelligent terminal mode switching method and its device
CN105530356B (en) Communication terminal and its data guard method and device
CN103714280B (en) A kind of authority control method and electronic equipment
CN206515931U (en) A kind of face identification system
CN103401987B (en) A kind of mobile terminal incoming call sound method for secret protection and system
CN102004881A (en) Mobile terminal and switching device and method of working modes thereof
CN104902080B (en) A kind of information interacting method and equipment
CN108021825A (en) A kind of method for protecting privacy, mobile terminal
CN106487584A (en) The management method of router, router and mobile terminal
CN105320871A (en) Screen unlocking method and screen unlocking apparatus
CN106412325A (en) Mobile intelligent terminal theft prevention method based on on-off encryption verification
CN102546938A (en) Cell phone capable of realizing safety protection by means of intelligently capturing human face images by aid of front-facing camera
CN108206892B (en) Method and device for protecting privacy of contact person, mobile terminal and storage medium
CN105630277A (en) Screen unlocking method and unlocking device for terminal
CN110442742A (en) Retrieve method and device, processor, electronic equipment and the storage medium of image
CN106650361A (en) Unblocking method and device
CN105913513A (en) Control method and system for door lock system
CN105278686A (en) Safety prompt method and device for smart wearable device
CN104885082A (en) Terminal and method for hiding and protecting data information
CN105635093A (en) Access method, wearable intelligent device, authentication method and terminal
CN107026935A (en) The authority control method and device of mobile device and mobile device
KR20100000274A (en) Mobile terminal and operation control method thereof
CN107463813A (en) Condition control method and Related product

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180116